{"id":"CVE-2025-13942","details":"A command injection vulnerability in the UPnP function of the Zyxel EX3510-B0 firmware versions through 5.17(ABUP.15.1)C0 could allow a remote attacker to execute operating system (OS) commands on an affected device by sending specially crafted UPnP SOAP requests.","modified":"2026-03-12T17:36:42.684814Z","published":"2026-02-24T03:16:00.223Z","references":[{"type":"ADVISORY","url":"https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-null-pointer-dereference-and-command-injection-vulnerabilities-in-certain-4g-lte-5g-nr-cpe-dsl-ethernet-cpe-fiber-onts-security-routers-and-wireless-extenders-02-24-2026"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-13942.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"5.18\\(acgj.0.5\\)c0"}]},{"events":[{"introduced":"0"},{"fixed":"1.00\\(abqu.9\\)c0"}]},{"events":[{"introduced":"0"},{"fixed":"1.18\\(acca.6\\)v0"}]},{"events":[{"introduced":"0"},{"fixed":"1.00\\(abuv.12\\)b2"}]},{"events":[{"introduced":"0"},{"fixed":"1.16\\(accc.1\\)v0"}]},{"events":[{"introduced":"0"},{"fixed":"5.17\\(abyl.10.1\\)c0"}]},{"events":[{"introduced":"0"},{"fixed":"5.17\\(abyl.10.1\\)c0"}]},{"events":[{"introduced":"0"},{"fixed":"5.19\\(acjq.4.1\\)c0"}]},{"events":[{"introduced":"0"},{"fixed":"5.13\\(abnp.8.2\\)c1"}]},{"events":[{"introduced":"0"},{"fixed":"5.50\\(acdi.2.4\\)c0"}]},{"events":[{"introduced":"0"},{"fixed":"5.17\\(abup.15.2\\)c0"}]},{"events":[{"introduced":"0"},{"fixed":"5.17\\(abup.15.2\\)c0"}]},{"events":[{"introduced":"0"},{"fixed":"5.17\\(abqx.11.1\\)c0"}]},{"events":[{"introduced":"0"},{"fixed":"5.70\\(aceg.5.4\\)c0"}]},{"events":[{"introduced":"0"},{"fixed":"5.18\\(acak.1.6\\)c0"}]},{"events":[{"introduced":"0"},{"fixed":"5.13\\(ably.10.2\\)c0"}]},{"events":[{"introduced":"0"},{"fixed":"5.44\\(acjb.1.5\\)c0"}]},{"events":[{"introduced":"0"},{"fixed":"5.44\\(achk.3\\)c0"}]},{"events":[{"introduced":"0"},{"fixed":"5.44\\(ackb.0.6\\)c0"}]}]}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}