Description

A post-authentication command injection vulnerability in the "ZyEE" function of the Zyxel EX5601-T1 firmware version V5.70(ACDZ.3.6)C0 and earlier could allow an authenticated attacker with administrator privileges to execute operating system (OS) commands on a vulnerable device.

INFO

Published Date :

2025-03-11T01:37:54.500Z

Last Modified :

2026-02-26T19:09:42.614Z

Source :

Zyxel
AFFECTED PRODUCTS

The following products are affected by CVE-2024-12009 vulnerability.

Vendors Products
Zyxel
  • Ax7501-b0
  • Ax7501-b0 Firmware
  • Ax7501-b1
  • Ax7501-b1 Firmware
  • Dx3300-t0
  • Dx3300-t0 Firmware
  • Dx3300-t1
  • Dx3300-t1 Firmware
  • Dx3301-t0
  • Dx3301-t0 Firmware
  • Dx4510-b0
  • Dx4510-b0 Firmware
  • Dx4510-b1
  • Dx4510-b1 Firmware
  • Dx5401-b0
  • Dx5401-b0 Firmware
  • Dx5401-b1
  • Dx5401-b1 Firmware
  • Ee6510-10
  • Ee6510-10 Firmware
  • Emg3525-t50b
  • Emg3525-t50b Firmware
  • Emg5523-t50b
  • Emg5523-t50b Firmware
  • Emg5723-t50k
  • Emg5723-t50k Firmware
  • Ex3300-t0
  • Ex3300-t0 Firmware
  • Ex3300-t1
  • Ex3300-t1 Firmware
  • Ex3301-t0
  • Ex3301-t0 Firmware
  • Ex3500-t0
  • Ex3500-t0 Firmware
  • Ex3501-t0
  • Ex3501-t0 Firmware
  • Ex3510-b0
  • Ex3510-b0 Firmware
  • Ex3510-b1
  • Ex3510-b1 Firmware
  • Ex3600-t0
  • Ex3600-t0 Firmware
  • Ex5401-b0
  • Ex5401-b0 Firmware
  • Ex5401-b1
  • Ex5401-b1 Firmware
  • Ex5501-b0
  • Ex5501-b0 Firmware
  • Ex5510-b0
  • Ex5510-b0 Firmware
  • Ex5512-t0
  • Ex5512-t0 Firmware
  • Ex5601-t0
  • Ex5601-t0 Firmware
  • Ex5601-t1
  • Ex5601-t1 Firmware
  • Ex7501-b0
  • Ex7501-b0 Firmware
  • Ex7710-b0
  • Ex7710-b0 Firmware
  • Px3321-t1
  • Px3321-t1 Firmware
  • Px5301-t0
  • Px5301-t0 Firmware
  • Vmg3625-t50b
  • Vmg3625-t50b Firmware
  • Vmg3927-t50k
  • Vmg3927-t50k Firmware
  • Vmg8623-t50b
  • Vmg8623-t50b Firmware
  • Vmg8825-t50k
  • Vmg8825-t50k Firmware
  • Wx5600-t0
  • Wx5600-t0 Firmware
  • Wx5610-b0
  • Wx5610-b0 Firmware

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact