CVE-2025-8693
Published: 18 November 2025
Description
A post-authentication command injection vulnerability in the "priv" parameter of Zyxel DX3300-T0 firmware version 5.50(ABVY.6.3)C0 and earlier could allow an authenticated attacker to execute operating system (OS) commands on an affected device.
Mitigating Controls (NIST 800-53 r5)AI
Directly validates inputs like the 'priv' parameter to block command injection payloads from executing OS commands.
Mandates timely patching of the specific firmware flaw enabling post-authentication command injection.
Enforces least privilege for authenticated low-privilege users to limit the scope and impact of injected OS commands.
Security SummaryAI
CVE-2025-8693 is a post-authentication command injection vulnerability (CWE-78) in the "priv" parameter of Zyxel DX3300-T0 firmware version 5.50(ABVY.6.3)C0 and earlier. This flaw allows an authenticated attacker to execute arbitrary operating system commands on the affected device. The vulnerability carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and was published on 2025-11-18T02:15:45.410.
An attacker with low-privilege authenticated access (PR:L) can exploit this vulnerability remotely over the network (AV:N) with low attack complexity (AC:L) and without requiring user interaction (UI:N). Successful exploitation enables execution of OS commands, resulting in high impacts to confidentiality, integrity, and availability (C:H/I:H/A:H), potentially leading to full device compromise.
The Zyxel security advisory provides details on mitigation, available at https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-uncontrolled-resource-consumption-and-command-injection-vulnerabilities-in-certain-4g-lte-5g-nr-cpe-dsl-ethernet-cpe-fiber-onts-security-routers-and-wireless-extenders-11-18-2025.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Post-authentication command injection in network device firmware directly enables arbitrary OS command execution (T1059.008: Network Device CLI) through exploitation of a remote management service (T1210: Exploitation of Remote Services).