CVE-2025-6599

5.3 MEDIUM

📋 TL;DR

An uncontrolled resource consumption vulnerability in Zyxel DX3301-T0 firmware allows attackers to perform Slowloris-style DoS attacks. This can temporarily block legitimate HTTP requests and disrupt access to the web management interface. Only devices running firmware version 5.50(ABVY.6.3)C0 and earlier are affected.

💻 Affected Systems

Products:
  • Zyxel DX3301-T0
Versions: 5.50(ABVY.6.3)C0 and earlier
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects web management interface; other networking services continue to operate during attack.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete denial of service for the web management interface, preventing administrative access until attack stops or device restarts.

🟠

Likely Case

Temporary disruption of web management interface access while attack is active, with other networking services continuing to function.

🟢

If Mitigated

Minimal impact if web interface is not internet-facing and network segmentation limits attack surface.

🌐 Internet-Facing: HIGH - Web management interfaces exposed to internet are directly vulnerable to DoS attacks from any source.
🏢 Internal Only: MEDIUM - Internal attackers could disrupt administrative access, but impact is limited to web interface only.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Slowloris attacks are well-known and easy to implement; no authentication required to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for latest patched version

Vendor Advisory: https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-uncontrolled-resource-consumption-and-command-injection-vulnerabilities-in-certain-4g-lte-5g-nr-cpe-dsl-ethernet-cpe-fiber-onts-security-routers-and-wireless-extenders-11-18-2025

Restart Required: Yes

Instructions:

1. Check vendor advisory for latest firmware version. 2. Download firmware from Zyxel support portal. 3. Log into web interface. 4. Navigate to Maintenance > Firmware Upgrade. 5. Upload and apply new firmware. 6. Device will restart automatically.

🔧 Temporary Workarounds

Restrict Web Interface Access

all

Limit access to web management interface to trusted IP addresses only

Configure firewall rules to restrict access to port 80/443 to specific management IPs

Disable Internet-Facing Web Interface

all

Remove web interface from internet exposure

Configure WAN firewall to block incoming HTTP/HTTPS traffic to device

🧯 If You Can't Patch

  • Implement network segmentation to isolate device from untrusted networks
  • Deploy rate limiting or DoS protection at network perimeter

🔍 How to Verify

Check if Vulnerable:

Check firmware version in web interface under Maintenance > System Info

Check Version:

Log into web interface and navigate to Maintenance > System Info

Verify Fix Applied:

Verify firmware version is newer than 5.50(ABVY.6.3)C0 after patching

📡 Detection & Monitoring

Log Indicators:

  • Multiple incomplete HTTP connections from single source
  • Web interface becoming unresponsive

Network Indicators:

  • Unusually high number of HTTP connections to port 80/443 with incomplete requests
  • Slowloris attack patterns in network traffic

SIEM Query:

source_ip=* dest_port=80 OR dest_port=443 | stats count by source_ip | where count > threshold

🔗 References

📤 Share & Export