CVE-2025-11845

4.9 MEDIUM

📋 TL;DR

A null pointer dereference vulnerability in Zyxel networking devices allows authenticated administrators to trigger a denial-of-service condition by sending a crafted HTTP request to the certificate downloader CGI program. This affects Zyxel VMG3625-T50B and WX3100-T0 firmware through specific versions. The vulnerability requires administrator credentials to exploit.

💻 Affected Systems

Products:
  • Zyxel VMG3625-T50B
  • Zyxel WX3100-T0
Versions: VMG3625-T50B firmware through 5.50(ABPM.9.6)C0, WX3100-T0 firmware through 5.50(ABVL.4.8)C0
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running affected firmware versions are vulnerable. The vulnerability is in the certificate downloader CGI program component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Device becomes completely unresponsive, requiring physical reboot or factory reset to restore functionality, disrupting network services for all connected users.

🟠

Likely Case

Temporary service interruption affecting the web management interface and potentially some network functions until device automatically restarts or is manually rebooted.

🟢

If Mitigated

Minimal impact with proper access controls preventing unauthorized administrators from exploiting the vulnerability.

🌐 Internet-Facing: MEDIUM - Devices exposed to the internet with default or weak admin credentials could be exploited if attackers gain admin access through other means.
🏢 Internal Only: LOW - Requires authenticated admin access, making it primarily an insider threat or post-compromise attack vector.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated administrator access. The crafted HTTP request triggers the null pointer dereference in the certificate downloader functionality.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions

Vendor Advisory: https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-null-pointer-dereference-and-command-injection-vulnerabilities-in-certain-4g-lte-5g-nr-cpe-dsl-ethernet-cpe-fiber-onts-security-routers-and-wireless-extenders-02-24-2026

Restart Required: Yes

Instructions:

1. Access device web interface with admin credentials. 2. Navigate to firmware update section. 3. Download latest firmware from Zyxel support portal. 4. Upload and apply firmware update. 5. Reboot device after update completes.

🔧 Temporary Workarounds

Restrict Admin Access

all

Limit administrative access to trusted IP addresses and networks only

Configure firewall rules to restrict access to device management interface (typically ports 80/443) from specific IP ranges

Disable Unnecessary Services

all

Disable remote management if not required

Access web interface > Administration > Remote Management > Disable

🧯 If You Can't Patch

  • Implement strict access controls allowing only trusted administrators to access the management interface
  • Monitor for unusual HTTP requests to certificate downloader endpoints and implement rate limiting

🔍 How to Verify

Check if Vulnerable:

Check firmware version in device web interface under System Information or via CLI command 'show version'

Check Version:

show version (CLI) or check System Information in web interface

Verify Fix Applied:

Verify firmware version is newer than affected versions listed in the advisory

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts followed by successful admin login
  • HTTP requests to certificate downloader CGI endpoints with unusual parameters
  • Device reboot logs without normal shutdown sequence

Network Indicators:

  • HTTP POST requests to /cgi-bin/certificate_downloader or similar endpoints with crafted parameters
  • Sudden drop in device responsiveness after specific HTTP requests

SIEM Query:

source="device_logs" AND (uri="/cgi-bin/certificate*" AND method="POST") AND (status=500 OR device="unresponsive")

🔗 References

📤 Share & Export