The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-11847

CVE-2025-11847: Zyxel LTE3301-Plus Firmware DoS Vulnerability

CVE-2025-11847 is a null pointer dereference DoS flaw in Zyxel LTE3301-Plus Firmware that allows authenticated administrators to crash the system. This article covers technical details, affected versions, and mitigation.

Published: February 27, 2026

CVE-2025-11847 Overview

A null pointer dereference vulnerability exists in the IP settings CGI program of multiple Zyxel network devices, including the VMG3625-T50B firmware versions through 5.50(ABPM.9.6)C0 and the WX3100-T0 firmware versions through 5.50(ABVL.4.8)C0. This vulnerability could allow an authenticated attacker with administrator privileges to trigger a denial-of-service (DoS) condition by sending a crafted HTTP request to the affected device.

Critical Impact

Authenticated administrators can crash affected Zyxel network equipment, causing service disruption for all connected users and potentially requiring physical device intervention to restore connectivity.

Affected Products

  • Zyxel VMG3625-T50B (firmware through 5.50(ABPM.9.6)C0)
  • Zyxel WX3100-T0 (firmware through 5.50(ABVL.4.8)C0)
  • Zyxel LTE3301-Plus, Nebula FWA505/510/515/710, DX3300/DX3301/DX4510/DX5401 series
  • Zyxel EX series (EX2210-T0, EX3300, EX3301, EX3500, EX3501, EX3510, EX3600, EX5401, EX5510, EX5512, EX5601, EX7501, EX7710)
  • Zyxel PMG, PE, PM, PX, WX, VMG, EMG, SCR, AX, GM, and WE series network devices

Discovery Timeline

  • February 24, 2026 - CVE-2025-11847 published to NVD
  • February 25, 2026 - Last updated in NVD database

Technical Details for CVE-2025-11847

Vulnerability Analysis

This vulnerability is classified as CWE-476 (NULL Pointer Dereference), a memory safety issue that occurs when an application attempts to use a pointer that has a value of NULL (zero) for an operation that requires a valid memory address. In the context of Zyxel network devices, this flaw exists within the IP settings CGI program that handles HTTP requests for network configuration.

When an authenticated administrator sends a specially crafted HTTP request to the vulnerable CGI endpoint, the firmware fails to properly validate input parameters before dereferencing a pointer. This causes the application to attempt to access memory at address zero, which on most systems results in an immediate crash of the affected process or the entire device.

The practical impact of this vulnerability is denial of service. While the vulnerability requires administrator-level authentication to exploit, malicious insiders, compromised admin accounts, or attackers who have gained administrative credentials through other means could leverage this flaw to disrupt network connectivity for all users relying on the affected device.

Root Cause

The root cause of CVE-2025-11847 is improper input validation in the IP settings CGI handler. The firmware code fails to verify that required parameters are present and valid before dereferencing associated pointers. When crafted input omits or malforms expected values, the code path results in a NULL pointer being used for memory operations, triggering an unhandled exception that crashes the device.

This type of vulnerability typically arises from:

  • Missing null checks before pointer dereferencing operations
  • Incomplete error handling when parsing HTTP request parameters
  • Assumptions that input data will always be well-formed when received from authenticated sessions

Attack Vector

The attack vector for this vulnerability is network-based, targeting the web management interface of affected Zyxel devices. An attacker must first authenticate to the device with administrator credentials, then send a malformed HTTP request to the IP settings CGI endpoint.

The exploitation process follows this pattern:

  1. Attacker gains access to administrator credentials through credential theft, brute force, or insider access
  2. Attacker authenticates to the device's web management interface
  3. Attacker crafts a malicious HTTP request targeting the vulnerable IP settings CGI program with missing or malformed parameters
  4. The CGI handler processes the request without proper validation
  5. A null pointer dereference occurs, causing the device to crash
  6. Network connectivity is disrupted until the device reboots or is manually recovered

While no public exploit code is currently available, the attack methodology is straightforward for anyone with administrative access. The vulnerability does not allow code execution or data exfiltration—its impact is limited to service disruption.

Detection Methods for CVE-2025-11847

Indicators of Compromise

  • Unexpected device reboots or crashes without scheduled maintenance
  • Anomalous HTTP requests to IP settings CGI endpoints in web server logs
  • Repeated authentication attempts followed by device unavailability
  • Administrative sessions accessing network configuration pages from unusual IP addresses

Detection Strategies

  • Monitor web management interface logs for malformed HTTP requests to CGI endpoints
  • Implement network intrusion detection rules to identify unusual patterns of administrative access followed by device failures
  • Deploy SNMP or syslog monitoring to track unexpected device reboot events
  • Correlate authentication logs with device availability metrics to identify potential exploitation attempts

Monitoring Recommendations

  • Enable verbose logging on affected Zyxel devices to capture detailed HTTP request information
  • Configure alerting for device connectivity failures or unexpected restarts
  • Implement centralized log collection from all affected network devices
  • Establish baseline device behavior to facilitate anomaly detection

How to Mitigate CVE-2025-11847

Immediate Actions Required

  • Review all administrator account credentials and ensure strong, unique passwords are in use
  • Restrict web management interface access to trusted management networks only
  • Audit administrative access logs for any suspicious activity
  • Consider disabling remote web management if not operationally required

Patch Information

Zyxel has released a security advisory addressing this vulnerability along with related command injection vulnerabilities. Organizations should consult the Zyxel Security Advisory for specific firmware versions that address CVE-2025-11847.

Administrators should:

  1. Identify all affected Zyxel devices in their environment
  2. Download updated firmware from Zyxel's support portal
  3. Schedule maintenance windows to apply firmware updates
  4. Verify successful patching by checking firmware version after update

Workarounds

  • Restrict administrative access to the web management interface using firewall rules or ACLs
  • Implement network segmentation to isolate management interfaces from general user traffic
  • Enable two-factor authentication for administrative access if supported by the device
  • Monitor for and immediately investigate any unexpected device behavior or crashes
bash
# Example: Restrict management interface access using iptables on upstream firewall
# Allow management access only from trusted admin subnet
iptables -A FORWARD -d <zyxel_device_ip> -p tcp --dport 80 -s <trusted_admin_subnet> -j ACCEPT
iptables -A FORWARD -d <zyxel_device_ip> -p tcp --dport 443 -s <trusted_admin_subnet> -j ACCEPT
iptables -A FORWARD -d <zyxel_device_ip> -p tcp --dport 80 -j DROP
iptables -A FORWARD -d <zyxel_device_ip> -p tcp --dport 443 -j DROP

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechZyxel

  • SeverityMEDIUM

  • CVSS Score4.9

  • EPSS Probability0.07%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-476
  • Vendor Resources
  • Zyxel Security Advisory for Vulnerabilities
  • Related CVEs
  • CVE-2025-11846: Zyxel LTE3301-Plus Firmware DoS Vulnerability

  • CVE-2025-11845: Zyxel LTE3301-Plus Firmware DoS Vulnerability

  • CVE-2025-11848: Zyxel Ee5301-00 Firmware DoS Vulnerability

  • CVE-2025-13943: Zyxel EX3301-T0 Auth Bypass Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English