CVE Discoveries

    A comprehensive list of security vulnerabilities I've discovered and responsibly disclosed.

    19
    Total CVEs
    1
    Critical
    7
    High
    95%
    Patched
    NEW

    CVE-2025-11730

    TBE
    CVSS 0
    Active

    Coming Soon!

    --
    ZYXELUnknown
    Unknown

    TBE

    CVE-2025-9133

    High
    CVSS 8.2
    Patched

    USG/ZyWALL Series - Authentication Bypass

    --
    ZYXELFirewall
    Firewall

    A missing authorization vulnerability in Zyxel ATP series firmware versions from could allow a semi-authenticated attacker—who has completed only the first stage of the two-factor authentication (2FA) process—to view and download the system configuration from an affected device.

    CVE-2025-8078

    High
    CVSS 7.2
    Patched

    USG/ZyWALL Series - Remote Code Execution via CLI Command Injection

    --
    ZYXELFirewall
    Firewall

    A post-authentication command injection vulnerability in Zyxel ATP series firmware versions could allow an authenticated attacker with administrator privileges to execute operating system (OS) commands on the affected device by passing a crafted string as an argument to a CLI command.

    CVE-2025-1732

    Medium
    CVSS 6.7
    Patched

    Local Privilege Escalation on ZYXEL FLEX H Series

    --
    ZYXELFLEX H Series
    Firewall

    An improper privilege management vulnerability in the recovery function of the USG FLEX H series uOS firmware version V1.31 and earlier could allow an authenticated local attacker with administrator privileges to upload a crafted configuration file and escalate privileges on a vulnerable device.

    CVE-2025-1731

    High
    CVSS 7.8
    Patched

    Remote Code Execution on ZYXEL FLEX H Series

    --
    ZYXELFLEX H Series
    Firewall

    An incorrect permission assignment vulnerability in the PostgreSQL commands of the USG FLEX H series uOS firmware versions from V1.20 through V1.31 could allow an authenticated local attacker with low privileges to gain access to the Linux shell and escalate their privileges by crafting malicious scripts or modifying system configurations with administrator-level access through a stolen token.