Mein #ZyXEL #DSLAM hat gestern auch seine neue Firmware bekommen und funzt einwandfrei. Jetzt kann ich noch 12 weitere ADSL2+ Anschlüsse (diesmal leider nur Annex A) anbieten. Die Dinger sind leider echt schwer (zu nicht-Mondpreisen) zu bekommen

#awoolan #dsl #isp2go

Was baut man um diese Uhrzeit nicht für Kabel, um den #ZyXEL #DSLAM zum laufen zu bekommen.

Ist ein RJ9 auf Seriell Kabel für den Konsolenport. Die Belegung stand zum Glück im Handbuch.

Zyxel warns of critical RCE flaw affecting over a dozen routers

Taiwan networking provider Zyxel has released security updates to address a critical vulnerability affecting over a dozen router models that can allow unauthenticated attackers to gain remote command execution on unpatched devices.

BleepingComputer

NCTAG 5.8: The Zyxel Perimeter Crisis
120,000 targets identified. The Cyber Mind Co™ has released Global Watchtower Manifest (GWM) NCTAG 1.1, detailing a critical Unauthenticated RCE (CVE-2025-13942) in Zyxel devices

https://thecybermind.co/2026/02/25/zyxel-upnp-crisis-cve-2025-13942/
#RCE #Zyxel

https://thecybermind.co/2026/02/25/zyxel-upnp-crisis-cve-2025-13942/?utm_source=mastodon&utm_medium=jetpack_social

The Zyxel UPnP Crisis-RCE Insightful Analysis 25FEB26

Critical Zyxel UPnP Crisis RCE (CVE-2025-13942) exposes 120,000 devices. Learn how to harden your perimeter with the NCTAG 5.8 report.

The Cyber Mind

NCTAG 5.8: The Zyxel Perimeter Crisis
120,000 targets identified. The Cyber Mind Co™ has released Global Watchtower Manifest (GWM) NCTAG 1.1, detailing a critical Unauthenticated RCE (CVE-2025-13942) in Zyxel devices

https://thecybermind.co/2026/02/25/zyxel-upnp-crisis-cve-2025-13942/
#RCE #Zyxel

https://thecybermind.co/2026/02/25/zyxel-upnp-crisis-cve-2025-13942/?utm_source=mastodon&utm_medium=jetpack_social

The Zyxel UPnP Crisis-RCE Insightful Analysis 25FEB26

Critical Zyxel UPnP Crisis RCE (CVE-2025-13942) exposes 120,000 devices. Learn how to harden your perimeter with the NCTAG 5.8 report.

The Cyber Mind
Critical Zyxel router flaw exposed devices to remote attacks

Zyxel fixed a critical flaw in multiple routers that lets unauthenticated attackers remotely execute commands on vulnerable devices.

Security Affairs
⚠️ CVE-2026-1459: HIGH-severity OS command injection in Zyxel VMG3625-T50B firmware ≤5.50(ABPM.9.7)C0. Authenticated admin can run arbitrary commands. Restrict admin access & monitor. Patch ASAP when released! https://radar.offseq.com/threat/cve-2026-1459-cwe-78-improper-neutralization-of-sp-f412c512 #OffSeq #Zyxel #CVE20261459 #InfoSec
CVE Alert: CVE-2026-1459 - Zyxel - VMG3625-T50B firmware - RedPacket Security

A post-authentication command injection vulnerability in the TR-369 certificate download CGI program of the Zyxel VMG3625-T50B firmware versions

RedPacket Security
CVE Alert: CVE-2025-13943 - Zyxel - EX3301-T0 firmware - RedPacket Security

A post-authentication command injection vulnerability in the log file download function of the Zyxel EX3301-T0 firmware versions through 5.50(ABVY.7)C0 could

RedPacket Security
Maybe one step closer to fixing the big regression for the #Zyxel GS1900-24E A1 switch in #OpenWrt? After a while of bisect'ing it seems to me that:
1) It worked in v24.10.0 because u-boot set things up correctly?
2) It broke between v24.10.0 and v24.10.1 bc. a commit added a in theory correct reset GPIO to DTS. Which would mess up what u-boot set up, and missed a correct reinitialization in Linux?
3) Things got "by accident" fixed in the main+25.10 branches bc. 1920 has no u-boot side setup.