Security Blog

    In-depth analysis, research findings, and technical writeups on cybersecurity topics.

    11
    Articles
    25
    Topics

    Featured Articles

    LLM Attack on ZYXEL Nebula AI

    As part of a research project on prompt injection and AI security, the behavior of Zyxel’s Nebula AI chatbot was analyzed. The objective was to evaluate whether the model could be manipulated into disclosing internal information or metadata not intended for end-users.

    LLM Attack
    AI
    ZYXEL
    Chatbot
    16/09/2025
    2 min read
    File Upload Vulnerability in ZYXEL Configuration Migration Tool

    An in-depth walkthrough of how a flawed file upload mechanism in Zyxel’s cloud migration service allowed arbitrary PHP file upload and execution, leading to full remote code execution on the backend infrastructure.

    Web Exploitation
    ZYXEL
    File Upload Vulnerability
    25/07/2025
    2 min read
    CVE-2025-1731/1732: Remote Code Execution in ZYXEL FLEX-H Series

    The incorrect permission assignment vulnerability in the PostgreSQL commands of certain USG FLEX H series uOS firmware versions could allow an authenticated local attacker with low privileges to gain access to the Linux shell and escalate their privileges by crafting malicious scripts or modifying system configurations with administrator-level access through a stolen token.

    ZYXEL
    Remote Code Execution
    Exploit
    CVE-2025-1731
    CVE-2025-1732
    uOS 1.31
    22/04/2025
    5 min read

    Recent Articles

    CVE-2025-8078: Remote Code Execution via CLI Command Injection
    21/10/2025
    3 min read

    CVE-2025-8078: Remote Code Execution via CLI Command Injection

    An undocumented parameter of the "web-auth" command could allow an authenticated attacker to execute commands remotely due to improper input sanitization, potentially resulting in full device compromise.

    ZYXEL
    Remote Code Execution
    ZLD 5.40
    CVE-2025-9133: Configuration Exposure via Authorization Bypass
    21/10/2025
    5 min read

    CVE-2025-9133: Configuration Exposure via Authorization Bypass

    A vulnerability in the zysh-cgi component of the USG/ATP Series allows a low-privileged, semi-authenticated attacker to access the device’s configuration, bypassing authorization controls. This issue arises due to missing authorization checks and an incomplete validation of disallowed inputs, enabling the attacker to interact with restricted system functionalities through crafted requests. Successful exploitation may lead to exposure or modification of sensitive configuration data, even when two-factor authentication is enabled for the compromised account.

    ZYXEL
    ZLD 5.40
    Authentication Bypass
    CVE-2023-27991: Remote Code Execution in ZYXEL ATP/USG (V5.35)
    05/03/2025
    3 min read

    CVE-2023-27991: Remote Code Execution in ZYXEL ATP/USG (V5.35)

    This writeup explain how to gain a remote code execution vulnerability in the ZLD product series. The vulnerability could allow attackers to execute arbitrary code on the target system.

    Remote Code Execution
    ZYXEL
    CVE-2023-27991
    ZLD 5.35
    A reverse engineering challenge from a CTF competition
    26/02/2025
    4 min read

    A reverse engineering challenge from a CTF competition

    This writeup covers the solution to a reverse engineering challenge from a recent CTF competition. The challenge required participants to reverse engineer a binary and find the flag.

    Reverse Engineering
    CTF
    CVE-2024-7203: Remote Code Execution in ZYXEL ATP/USG (V5.38)
    21/02/2025
    3 min read

    CVE-2024-7203: Remote Code Execution in ZYXEL ATP/USG (V5.38)

    During our ZLD assessment, we found a vulnerability to OS Command Injection that could allow attackers to compromise the entire device.

    ZYXEL
    Remote Code Execution
    Firewall
    CVE-2024-7203
    ZLD V5.38
    CVE-2024-12398: Privilege Escalation in ZYXEL Access Point
    20/02/2025
    2 min read

    CVE-2024-12398: Privilege Escalation in ZYXEL Access Point

    I found a privilege escalation vulnerability in the WBE product series, allowing unauthorized administrative access under certain conditions.

    ZYXEL
    Privilege Escalation
    CVE-2024-12398
    Multiple versions