CVE-2025-13942
Published Feb 24, 2026
Last updated 2 months ago
AI description
CVE-2025-13942 is currently a reserved CVE identifier. This means that a CVE Numbering Authority (CNA) has allocated this ID for a potential vulnerability, but the specific details, such as the affected product, vulnerability type, and impact, have not yet been publicly disclosed or published in a CVE record. As such, there are no popular articles or detailed descriptions available for this particular CVE at this time.
- Description
- A command injection vulnerability in the UPnP function of the Zyxel EX3510-B0 firmware versions through 5.17(ABUP.15.1)C0 could allow a remote attacker to execute operating system (OS) commands on an affected device by sending specially crafted UPnP SOAP requests.
- Source
- security@zyxel.com.tw
- NVD status
- Analyzed
- Products
- wx5610-b0_firmware, lte3301-plus_firmware, nebula_lte3301-plus_firmware, nr7101_firmware, nebula_nr7101_firmware, dx4510-b0_firmware, dx4510-b1_firmware, ee6510-10_firmware, emg6726-b10a_firmware, ex2210-t0_firmware, ex3510-b0_firmware, ex3510-b1_firmware, ex5510-b0_firmware, ex5512-t0_firmware, ex7710-b0_firmware, vmg4927-b50a_firmware, px3321-t1_firmware, px5301-t0_firmware
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
- security@zyxel.com.tw
- CWE-78
- Hype score
- Not currently trending
Zyxel Router の複数の脆弱性が FIX:OS コマンド実行や DoS 攻撃の恐れ https://t.co/BgPF0a6U7j Zyxel が、家庭用/ビジネス用のルーターやエクステンダーを含む、複数の製品に存在する深刻なリモートコード実行 (RCE) の
@iototsecnews
4 Mar 2026
224 Impressions
1 Retweet
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-13942 (CVSS:9.8, CRITICAL) is Analyzed. A command injection vulnerability in the UPnP function of the Zyxel EX3510-B0 firmware versions through 5.17(ABUP.15.1)C..https://t.co/SDwfRZW2W5 #cybersecurityawareness #cybersecurity #CVE #infosec #hacker #nvd #mitre
@cracbot
1 Mar 2026
59 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-13942 (CVSS:9.8, CRITICAL) is Analyzed. A command injection vulnerability in the UPnP function of the Zyxel EX3510-B0 firmware versions through 5.17(ABUP.15.1)C..https://t.co/SDwfRZW2W5 #cybersecurityawareness #cybersecurity #CVE #infosec #hacker #nvd #mitre
@cracbot
28 Feb 2026
54 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️ Vulnerabilidades en productos Zyxel ❗ CVE-2026-1459 ❗ CVE-2025-13943 ❗ CVE-2025-13942 ➡️ Más info: https://t.co/46G5AlbX0D https://t.co/Mm5XqgBCoc
@CERTpy
27 Feb 2026
79 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Zyxel patches critical UPnP command-injection bug enabling unauthenticated RCE on routers Zyxel shipped fixes for a critical UPnP command-injection flaw (CVE-2025-13942) affecting multiple CPE/router models that could let unauthenticated attackers execute OS commands via
@ThreatSynop
26 Feb 2026
40 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 @zyxel patches critical CVE-2025-13942 RCE flaw affecting 12+ routers including 4G/5G, DSL/Ethernet, Fiber ONTs, wireless extenders. • Remote OS command execution via UPnP • Exploitation requires WAN + UPnP enabled • 120k+ exposed devices tracked globally Patch now &am
@TechNadu
26 Feb 2026
50 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Critical Zyxel router vulnerability (CVE-2025-13942) exposes 120K+ devices to unauthenticated RCE. Implement network segmentation, isolate critical systems, deploy hardware firewalls, and maintain air-gapped backups. Verify firmware patches immediately. #TheSovereignProtocol
@sovereignexec
26 Feb 2026
38 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 ALERTĂ: CVE-2025-13942 este o vulnerabilitate critică, cu scor CVSS v3.1 de 9.8, de tip “OS Command Injection” care afectează funcția Universal Plug and Play (UPnP) din mai multe echipamente Zyxel. 👉 https://t.co/dfOXw7pSxK #DNSC https://t.co/yDt3fgFgIq
@DNSC_RO
26 Feb 2026
82 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Zyxel Patches Critical 9.8 Command Injection Flaw Across Many Router/CPE Models Zyxel fixed multiple high-severity bugs—most notably CVE-2025-13942 (CVSS 9.8), an unauthenticated OS command injection in the UPnP service that can be exploited via crafted UPnP SOAP requests
@ThreatSynop
26 Feb 2026
23 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Zyxel Fixes Critical 9.8 RCE in Dozens of Devices via UPnP (CVE-2025-13942) Zyxel patched a critical OS command injection flaw (CVSS 9.8) in the UPnP feature that could allow remote attackers to execute OS commands via crafted UPnP SOAP requests—primarily if WAN access and
@ThreatSynop
26 Feb 2026
25 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Zyxel has released updates for over a dozen router models to fix a critical vulnerability, CVE-2025-13942, allowing remote command execution. While exploitation requires specific settings to be enabled, users should install the patches. Zyxel also addressed two high-severity
@cybernewslive
26 Feb 2026
49 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Critical Zyxel router UPnP command-injection flaw enables unauth remote OS command execution Zyxel patched CVE-2025-13942 (CVSS 9.8), a UPnP command-injection bug affecting 4G/5G CPE, DSL/Ethernet CPE, Fiber ONTs, and wireless extenders that can allow unauth attackers to run
@ThreatSynop
25 Feb 2026
59 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Zyxel patches critical RCE flaw CVE-2025-13942 impacting 4G/5G CPE, DSL/Ethernet CPE, fiber ONT, and wireless extenders. Exploits require UPnP and WAN enabled. End-of-life devices remain at risk. #ZyxelRouters #RemoteExec #USA https://t.co/QQQMyXZc22
@TweetThreatNews
25 Feb 2026
116 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
Zyxel patches critical RCE bug CVE-2025-13942 in UPnP affecting 4G/5G CPE, DSL/Ethernet CPE, Fiber ONTs and extenders, enabling unauthenticated remote OS command execution on routers. https://t.co/5YAd8wEZyD
@threatcluster
25 Feb 2026
72 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
CRITICAL CVE ALERT ‼️🚨 Zyxel has released security updates to address a critical vulnerability, CVE-2025-13942, which affects over a dozen router models. To find out more on how to patch, please visit the link below: https://t.co/PsyUcD6lKV
@Cyber_Toolkit
25 Feb 2026
49 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨 Zyxel Patches Critical Router RCE Bug (CVE-2025-13942) Impacting 12+ Models Zyxel fixed a critical UPnP command-injection flaw (CVE-2025-13942) that allows unauthenticated remote OS command execution via crafted UPnP SOAP requests, but exploitation typically requires both UP
@ThreatSynop
25 Feb 2026
50 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Zyxel社NW機器各種に重大(Critical)な脆弱性。CVE-2025-13942はCVSSスコア9.8で、UPnP SOAPリクエストにおけるコマンドインジェクション脆弱性。その他コマンドインジェクション等複数脆弱性と併せ修正。 https://t.co/dRU6c0
@__kokumoto
25 Feb 2026
683 Impressions
0 Retweets
2 Likes
1 Bookmark
0 Replies
0 Quotes
Zyxel issues urgent patches for a critical 9.8 severity flaw (CVE-2025-13942) in UPnP functions that allows remote attackers to execute OS commands. Patch now! #Zyxel #CyberSecurity #CVE202513942 #RouterSecurity #InfoSec #RCE #PatchAlert #Vulnerability https://t.co/sH3GbusWlN
@the_yellow_fall
25 Feb 2026
170 Impressions
1 Retweet
2 Likes
0 Bookmarks
0 Replies
0 Quotes
Zyxel has published 2 CVEs for some vulns I found :D CVE-2025-13943: Authenticated command injection in log export CGI CVE-2025-13942: Unauthenticated command injection in UPnP daemon I will blog about this in the coming months. Meanwhile, exploits here: https://t.co/CbVHekdN5q
@hacefresko
24 Feb 2026
2068 Impressions
13 Retweets
37 Likes
9 Bookmarks
1 Reply
0 Quotes
CVE-2025-13942 A command injection vulnerability in the UPnP function of the Zyxel EX3510-B0 firmware versions through 5.17(ABUP.15.1)C0 could allow a remote attacker to execute ope… https://t.co/zhenTwFhzu
@CVEnew
24 Feb 2026
48 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[CVE-2025-13942: CRITICAL] Critical vulnerability in Zyxel EX3510-B0 firmware allows remote attackers to execute OS commands via UPnP function. Update to version 5.17(ABUP.15.1)C0 to patch the issue.#cve,CVE-2025-13942,#cybersecurity https://t.co/ErrC3xhwrW
@CveFindCom
24 Feb 2026
50 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
**CVE-2025-13942** is a command injection vulnerability affecting the UPnP (Universal Plug and Play) function in Zyxel EX3510-B0 firmware versions up to 5.17(ABUP.15.1)C0. This flaw allows a remote attacker to execute arbitrary operating system commands on the affected device by
@CveTodo
24 Feb 2026
53 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:zyxel:wx5610-b0_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B96C5D67-D4B3-460C-8EED-A847F0AF99DB",
"versionEndExcluding": "5.18\\(acgj.0.5\\)c0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:zyxel:wx5610-b0:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88909887-E078-4EC5-BA49-2EFCABF1EB1B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:zyxel:lte3301-plus_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0F3EFC9C-25BF-4DE2-82BB-E169C696AB04",
"versionEndExcluding": "1.00\\(abqu.9\\)c0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:zyxel:lte3301-plus:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4814D3A1-C0D4-4573-AD77-C2EE7AC11CB4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:zyxel:nebula_lte3301-plus_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "54C6D399-871E-4C6D-BCE4-DFCF7D2C6318",
"versionEndExcluding": "1.18\\(acca.6\\)v0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:zyxel:nebula_lte3301-plus:-:*:*:*:*:*:*:*",
"matchCriteriaId": "42297A6A-3E50-4E9E-ABF6-58C77F222DC1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:zyxel:nr7101_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "97F44895-CA69-43F3-AE10-32EE7FAE611E",
"versionEndExcluding": "1.00\\(abuv.12\\)b2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:zyxel:nr7101:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E4D27B24-9822-432C-8B8B-9546EE32DEC6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:zyxel:nebula_nr7101_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D37106AA-6CFB-4B4F-8D88-94DF2D76E869",
"versionEndExcluding": "1.16\\(accc.1\\)v0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:zyxel:nebula_nr7101:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52096C1F-F73C-413E-9D37-82EFA4703AEC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:zyxel:dx4510-b0_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AC432F5C-8013-4E96-969C-BCFCA11D3883",
"versionEndExcluding": "5.17\\(abyl.10.1\\)c0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:zyxel:dx4510-b0:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A0338E1C-2509-4510-8C8D-4BD5AEA47D81",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:zyxel:dx4510-b1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AEA4C738-597E-4BB1-AB7C-8A0343FADFE8",
"versionEndExcluding": "5.17\\(abyl.10.1\\)c0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:zyxel:dx4510-b1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C8668990-045A-4DDD-9089-DE0025B69765",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:zyxel:ee6510-10_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A28F95D9-1258-4A48-90BD-C940AD483932",
"versionEndExcluding": "5.19\\(acjq.4.1\\)c0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:zyxel:ee6510-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD4AE46D-E374-4224-9A66-4291B6A10C00",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:zyxel:emg6726-b10a_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C7B10052-0ABA-4488-94E6-046C8445977A",
"versionEndExcluding": "5.13\\(abnp.8.2\\)c1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:zyxel:emg6726-b10a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "304D3B33-F7EC-4EB3-B6EF-6BEB2112F9C0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:zyxel:ex2210-t0_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5CEFD711-D838-42EB-B555-FA9AA012BF50",
"versionEndExcluding": "5.50\\(acdi.2.4\\)c0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:zyxel:ex2210-t0:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A71E4E6F-357E-4DAA-B7D7-7CF44000F0CF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:zyxel:ex3510-b0_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E4338AEC-15AE-44F5-B9CF-743E9CF57014",
"versionEndExcluding": "5.17\\(abup.15.2\\)c0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:zyxel:ex3510-b0:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0455EC5-B783-4CDB-9DC0-D8EF377A5F2C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:zyxel:ex3510-b1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "67391540-C81F-4404-8F2F-038DCD719E15",
"versionEndExcluding": "5.17\\(abup.15.2\\)c0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:zyxel:ex3510-b1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3F955BD9-4D44-46BE-8605-51C6250A74D9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:zyxel:ex5510-b0_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FB37D43B-9E31-4C30-9C8D-C851DB9ED61E",
"versionEndExcluding": "5.17\\(abqx.11.1\\)c0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:zyxel:ex5510-b0:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E82D41CC-2EB3-4892-8383-FB2C9EC64D9E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:zyxel:ex5512-t0_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6CDAF378-B521-4C2C-A2BE-4B6F5E80E00C",
"versionEndExcluding": "5.70\\(aceg.5.4\\)c0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:zyxel:ex5512-t0:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F32FA3FB-CE89-4CC1-9D8D-765B90A122DF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:zyxel:ex7710-b0_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0453035D-D806-426F-BA39-A640AF4061BC",
"versionEndExcluding": "5.18\\(acak.1.6\\)c0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:zyxel:ex7710-b0:-:*:*:*:*:*:*:*",
"matchCriteriaId": "07727D9C-723B-4761-B6B6-07FE1784D3C1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:zyxel:vmg4927-b50a_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5FABB6F2-114B-4732-A4C7-467E99B1ADF5",
"versionEndExcluding": "5.13\\(ably.10.2\\)c0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:zyxel:vmg4927-b50a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0EE70D2-51BB-4E45-8995-655C1394C440",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:zyxel:px3321-t1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "68683D4E-65E9-4BD0-B9FD-9593170BF6C3",
"versionEndExcluding": "5.44\\(acjb.1.5\\)c0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:zyxel:px3321-t1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BB525DE-2E08-4848-976E-7DF6C7E19578",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:zyxel:px3321-t1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8F751BEB-1A49-4124-B45B-3730AA448CDE",
"versionEndExcluding": "5.44\\(achk.3\\)c0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:zyxel:px3321-t1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BB525DE-2E08-4848-976E-7DF6C7E19578",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:zyxel:px5301-t0_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "01B59D2A-6414-4672-A695-744A829416B5",
"versionEndExcluding": "5.44\\(ackb.0.6\\)c0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:zyxel:px5301-t0:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7EBB4C27-DAEB-4297-98DC-3B22353B5184",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
]