{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T02:38:05.584","vulnerabilities":[{"cve":{"id":"CVE-2025-11730","sourceIdentifier":"security@zyxel.com.tw","published":"2026-02-05T02:15:52.380","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"A post‑authentication command injection vulnerability in the Dynamic DNS (DDNS) configuration CLI command in Zyxel ATP series firmware versions from V5.35 through V5.41, USG FLEX series firmware versions from V5.35 through V5.41, USG FLEX 50(W) series firmware versions from V5.35 through V5.41, and USG20(W)-VPN series firmware versions from V5.35 through V5.41 could allow an authenticated attacker with administrator privileges to execute operating system (OS) commands on an affected device by supplying a specially crafted string as an argument to the CLI command."},{"lang":"es","value":"Una vulnerabilidad de inyección de comandos de post-autenticación en el comando CLI de configuración de Dynamic DNS (DDNS) en las versiones de firmware de la serie Zyxel ATP desde V5.35 hasta V5.41, las versiones de firmware de la serie USG FLEX desde V5.35 hasta V5.41, las versiones de firmware de la serie USG FLEX 50(W) desde V5.35 hasta V5.41, y las versiones de firmware de la serie USG20(W)-VPN desde V5.35 hasta V5.41 podría permitir a un atacante autenticado con privilegios de administrador ejecutar comandos del sistema operativo (SO) en un dispositivo afectado al proporcionar una cadena especialmente diseñada como argumento al comando CLI."}],"metrics":{"cvssMetricV31":[{"source":"security@zyxel.com.tw","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}]},"weaknesses":[{"source":"security@zyxel.com.tw","type":"Primary","description":[{"lang":"en","value":"CWE-78"}]}],"references":[{"url":"https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-post-authentication-command-injection-vulnerability-in-the-ddns-configuration-cli-command-of-zld-firewalls-02-05-2026","source":"security@zyxel.com.tw"}]}}]}