The Zyxelwatch hub is a vendor-specific view inside ITECS MSP Threat Radar. We pull the latest security advisories, incidents, and known-exploited CVEs directly from the official feeds below, score each one for MSP relevance, and surface what's most likely to need attention this week.
Confirm whether recent Zyxel activity overlaps with your environment.
Prioritize advisories by MSP-relevance score, severity, and status.
Turn the signal into an assessment, briefing, or managed-service engagement with ITECS.
At a glance
Tracked
15
Active
12
Featured
13
Unique CVEs
15
Most recent entry
Apr 27, 2026, 10:16 PM
Feed refreshes daily · 5:15 a.m. Central
Sources·CISA KEV and NVD (product vendor coverage)
"Most recent entry" is the newest item the upstream feed has published — not our sync time.
Watch items
Recent Zyxel watch items
Showing the 15 most recent items, newest first. Each row links to the official advisory.
15 rows · sorted newest first
Operations view
Zyxel DX3301-T0 and EX3301-T0 vulnerability (CVE-2026-1460)
HIGH
watchNVDCVE-2026-1460
A post-authentication command injection vulnerability in the “DomainName” parameter of the DHCP configuration file in Zyxel DX3301-T0 and EX3301-T0 firmware versions through 5.50(ABVY.7.1)C0 could allow an authenticated attacker with administrator privileges to execute OS commands on an affected device.
Multiple Zyxel DSL CPE devices contain a post-authentication command injection vulnerability in the management commands that could allow an authenticated attacker to execute OS commands via Telnet.
Multiple Zyxel DSL CPE devices contain a post-authentication command injection vulnerability in the CGI program that could allow an authenticated attacker to execute OS commands via a crafted HTTP request.
Multiple Zyxel firewalls contain a path traversal vulnerability in the web management interface that could allow an attacker to download or upload files via a crafted URL. Known ransomware use: Known.
Zyxel P660HN-T1A routers contain a command injection vulnerability in the Remote System Log forwarding function, which is accessible by an unauthenticated user and exploited via the remote_host parameter of the ViewLog.asp page.
Zyxel Multiple NAS Devices Command Injection Vulnerability
critical
activeCISA KEVCVE-2023-27992
Multiple Zyxel network-attached storage (NAS) devices contain a pre-authentication command injection vulnerability that could allow an unauthenticated attacker to execute commands remotely via a crafted HTTP request.
Zyxel ATP, USG FLEX, USG FLEX 50(W), USG20(W)-VPN, VPN, and ZyWALL/USG firewalls contain a buffer overflow vulnerability in the notification function that could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and remote code execution on an affected device.
Zyxel ATP, USG FLEX, USG FLEX 50(W), USG20(W)-VPN, VPN, and ZyWALL/USG firewalls contain a buffer overflow vulnerability in the ID processing function that could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and remote code execution on an affected device.
Zyxel Multiple Firewalls OS Command Injection Vulnerability
critical
activeCISA KEVCVE-2023-28771
Zyxel ATP, USG FLEX, VPN, and ZyWALL/USG firewalls allow for improper error message handling which could allow an unauthenticated attacker to execute OS commands remotely by sending crafted packets to an affected device.
Zyxel Multiple Firewalls OS Command Injection Vulnerability
critical
activeCISA KEVCVE-2022-30525
A command injection vulnerability in the CGI program of some Zyxel firewall versions could allow an attacker to modify specific files and then execute some OS commands on a vulnerable device.
Zyxel Multiple NAS Devices OS Command Injection Vulnerability
critical
activeCISA KEVCVE-2020-9054
Multiple Zyxel network-attached storage (NAS) devices contain a pre-authentication command injection vulnerability, which may allow a remote, unauthenticated attacker to execute arbitrary code.
Zyxel Multiple Products Use of Hard-Coded Credentials Vulnerability
critical
activeCISA KEVCVE-2020-29583
Zyxel firewalls (ATP, USG, VM) and AP Controllers (NXC2500 and NXC5500) contain a use of hard-coded credentials vulnerability in an undocumented account ("zyfwp") with an unchangeable password.
A command injection vulnerability was discovered on the Zyxel EMG2926 home router with firmware V1.00(AAQT.4)b8. The vulnerability is located in the diagnostic tools, specifically the nslookup function. A malicious user may exploit numerous vectors to execute arbitrary commands on the router, such as the ping_ip parameter to the expert/maintenance/diagnostic/nslookup URI.
ZyXEL Prestige routers, including P-660, P-661, and P-662 models with firmware 3.40(PE9) and 3.40(AGD.2) through 3.40(AHQ.3), do not use a salt when calculating an MD5 password hash, which makes it easier for attackers to crack passwords.
ZyXEL ZyWALL 1050 has a hard-coded password for the Quagga and Zebra processes that is not changed when it is set by a user, which allows remote attackers to gain privileges.
Zyxel DX3301-T0 and EX3301-T0 vulnerability (CVE-2026-1460)
A post-authentication command injection vulnerability in the “DomainName” parameter of the DHCP configuration file in Zyxel DX3301-T0 and EX3301-T0 firmware versions through 5.50(ABVY.7.1)C0 could allow an authenticated attacker with administrator privileges to execute OS commands on an affected device.
DX3301-T0 and EX3301-T0
HIGHCVE-2026-1460
Watch
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 0.2% EPSS.
Multiple Zyxel DSL CPE devices contain a post-authentication command injection vulnerability in the management commands that could allow an authenticated attacker to execute OS commands via Telnet.
DSL CPE Devices
criticalCVE-2024-40891
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 53.2% EPSS.
Multiple Zyxel DSL CPE devices contain a post-authentication command injection vulnerability in the CGI program that could allow an authenticated attacker to execute OS commands via a crafted HTTP request.
DSL CPE Devices
criticalCVE-2024-40890
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 45.9% EPSS.
Multiple Zyxel firewalls contain a path traversal vulnerability in the web management interface that could allow an attacker to download or upload files via a crafted URL. Known ransomware use: Known.
Multiple Firewalls
criticalCVE-2024-11667
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 28.6% EPSS.
Zyxel P660HN-T1A routers contain a command injection vulnerability in the Remote System Log forwarding function, which is accessible by an unauthenticated user and exploited via the remote_host parameter of the ViewLog.asp page.
P660HN-T1A Routers
criticalCVE-2017-18368
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 93.6% EPSS.
Zyxel Multiple NAS Devices Command Injection Vulnerability
Multiple Zyxel network-attached storage (NAS) devices contain a pre-authentication command injection vulnerability that could allow an unauthenticated attacker to execute commands remotely via a crafted HTTP request.
Multiple Network-Attached Storage (NAS) Devices
criticalCVE-2023-27992
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 86.5% EPSS.
Zyxel ATP, USG FLEX, USG FLEX 50(W), USG20(W)-VPN, VPN, and ZyWALL/USG firewalls contain a buffer overflow vulnerability in the notification function that could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and remote code execution on an affected device.
Multiple Firewalls
criticalCVE-2023-33009
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 6.2% EPSS.
Zyxel ATP, USG FLEX, USG FLEX 50(W), USG20(W)-VPN, VPN, and ZyWALL/USG firewalls contain a buffer overflow vulnerability in the ID processing function that could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and remote code execution on an affected device.
Multiple Firewalls
criticalCVE-2023-33010
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 5.9% EPSS.
Zyxel Multiple Firewalls OS Command Injection Vulnerability
Zyxel ATP, USG FLEX, VPN, and ZyWALL/USG firewalls allow for improper error message handling which could allow an unauthenticated attacker to execute OS commands remotely by sending crafted packets to an affected device.
Multiple Firewalls
criticalCVE-2023-28771
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 94.3% EPSS.
Zyxel Multiple Firewalls OS Command Injection Vulnerability
A command injection vulnerability in the CGI program of some Zyxel firewall versions could allow an attacker to modify specific files and then execute some OS commands on a vulnerable device.
Multiple Firewalls
criticalCVE-2022-30525
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 94.4% EPSS.
Zyxel Multiple NAS Devices OS Command Injection Vulnerability
Multiple Zyxel network-attached storage (NAS) devices contain a pre-authentication command injection vulnerability, which may allow a remote, unauthenticated attacker to execute arbitrary code.
Multiple Network-Attached Storage (NAS) Devices
criticalCVE-2020-9054
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 94.3% EPSS.
Zyxel Multiple Products Use of Hard-Coded Credentials Vulnerability
Zyxel firewalls (ATP, USG, VM) and AP Controllers (NXC2500 and NXC5500) contain a use of hard-coded credentials vulnerability in an undocumented account ("zyfwp") with an unchangeable password.
Multiple Products
criticalCVE-2020-29583
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 94.4% EPSS.
A command injection vulnerability was discovered on the Zyxel EMG2926 home router with firmware V1.00(AAQT.4)b8. The vulnerability is located in the diagnostic tools, specifically the nslookup function. A malicious user may exploit numerous vectors to execute arbitrary commands on the router, such as the ping_ip parameter to the expert/maintenance/diagnostic/nslookup URI.
emg2926 firmware
HIGHCVE-2017-6884
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 90.1% EPSS.
ZyXEL Prestige routers, including P-660, P-661, and P-662 models with firmware 3.40(PE9) and 3.40(AGD.2) through 3.40(AHQ.3), do not use a salt when calculating an MD5 password hash, which makes it easier for attackers to crack passwords.
p-663hn-51 firmware
HIGHCVE-2008-1526
Watch
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 0.2% EPSS.
ZyXEL ZyWALL 1050 has a hard-coded password for the Quagga and Zebra processes that is not changed when it is set by a user, which allows remote attackers to gain privileges.
zywall 1050 firmware
CRITICALCVE-2008-1160
Watch
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 16.3% EPSS.
It is the Zyxel-specific view inside ITECS Threat Radar, built to track recent advisories, incidents, and watch items that may affect Dallas-area business operations.
How should teams use the Zyxel watch page?
Use it to confirm whether current Zyxel issues overlap with your environment, prioritize remediation, and decide whether you need an assessment, managed security follow-through, or vendor-specific hardening work.
Can ITECS help respond to Zyxel security issues?
Yes. ITECS can help map Zyxel advisories against your systems, validate affected services, prioritize remediation, and connect the issue to broader managed cybersecurity or managed IT workflows.