CVE-2026-0711
Post-Auth Command Injection in Zyxel DX3300-T0 EasyMesh APIs
Publication date: 2026-04-28
Last updated on: 2026-04-28
Assigner: Zyxel Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| zyxel | dx3300-t0 | 5.50_abvy.7.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-78 | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a post-authentication command injection issue found in the EasyMesh-related APIs of Zyxel DX3300-T0 devices running firmware versions up to 5.50(ABVY.7.1)C0.
An attacker who is authenticated and adjacent to the device, and who has administrator privileges, could exploit this vulnerability to execute arbitrary operating system commands on the affected device.
How can this vulnerability impact me? :
Exploitation of this vulnerability could allow an attacker with administrator access to execute arbitrary OS commands on the device, potentially leading to full control over the device.
- Compromise of device integrity and availability.
- Potential unauthorized access to sensitive data or network resources.
- Disruption of network services relying on the affected device.