- Description
- A buffer overflow vulnerability in the URL parser of the zhttpd web server in Zyxel VMG8825-T50K firmware versions prior to V5.50(ABOM.5)C0 could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and potentially execute arbitrary code by sending a specially crafted HTTP request.
- Source
- security@zyxel.com.tw
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
- security@zyxel.com.tw
- CWE-120
- Hype score
- Not currently trending
[CVE-2025-7673: CRITICAL] Critical buffer overflow vulnerability in Zyxel VMG8825-T50K web server could allow attackers to trigger DoS and execute code. Update to V5.50(ABOM.5)C0 to stay secure.#cve,CVE-2025-7673,#cybersecurity https://t.co/jabhQ241kf https://t.co/kTK1RLXlPd
@CveFindCom
16 Jul 2025
33 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-7673 A buffer overflow vulnerability in the URL parser of the zhttpd web server in Zyxel VMG8825-T50K firmware versions prior to V5.50(ABOM.5)C0 could allow an unauthenticat… https://t.co/8R6UoRfVja
@CVEnew
16 Jul 2025
233 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes