A post‑authentication command injection vulnerability in the Dynamic DNS (DDNS) configuration CLI command in Zyxel ATP series firmware versions from V5.35 through V5.41, USG FLEX series firmware versions from V5.35 through V5.41, USG FLEX 50(W) series firmware versions from V5.35 through V5.41, and USG20(W)-VPN series firmware versions from V5.35 through V5.41 could allow an authenticated attacker with administrator privileges to execute operating system (OS) commands on an affected device by supplying a specially crafted string as an argument to the CLI command.
History

Thu, 05 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 05 Feb 2026 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Zyxel
Zyxel atp Series Firmware
Zyxel usg20(w)-vpn Series Firmware
Zyxel usg Flex 50(w) Series Firmware
Zyxel usg Flex Series Firmware
Vendors & Products Zyxel
Zyxel atp Series Firmware
Zyxel usg20(w)-vpn Series Firmware
Zyxel usg Flex 50(w) Series Firmware
Zyxel usg Flex Series Firmware

Thu, 05 Feb 2026 02:15:00 +0000

Type Values Removed Values Added
Description A post‑authentication command injection vulnerability in the Dynamic DNS (DDNS) configuration CLI command in Zyxel ATP series firmware versions from V5.35 through V5.41, USG FLEX series firmware versions from V5.35 through V5.41, USG FLEX 50(W) series firmware versions from V5.35 through V5.41, and USG20(W)-VPN series firmware versions from V5.35 through V5.41 could allow an authenticated attacker with administrator privileges to execute operating system (OS) commands on an affected device by supplying a specially crafted string as an argument to the CLI command.
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Zyxel

Published: 2026-02-05T01:55:12.291Z

Updated: 2026-02-05T14:56:24.210Z

Reserved: 2025-10-14T02:35:13.097Z

Link: CVE-2025-11730

cve-icon Vulnrichment

Updated: 2026-02-05T14:56:20.754Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-05T02:15:52.380

Modified: 2026-02-05T14:57:20.563

Link: CVE-2025-11730

cve-icon Redhat

No data.