CVE-2024-40890

HIGH CISA KEV

CVSS v3

8.8

HIGH

EPSS Score

exploit probability

CISA KEV

Yes

known exploited

Exploitation

SSVC status

Description

**UNSUPPORTED WHEN ASSIGNED** A post-authentication command injection vulnerability in the CGI program of the legacy DSL CPE Zyxel VMG4325-B10A firmware version 1.00(AAFR.4)C0_20170615 could allow an authenticated attacker to execute operating system (OS) commands on an affected device by sending a crafted HTTP POST request.

CISA Known Exploited Vulnerability

Date Added
2/11/2025
Patch Due Date
3/4/2025
Required Action
The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization if a current mitigation is unavailable.

Technical Details

CVSS v3 Vector
3.1
Published
2/4/2025
Last Modified
10/27/2025

Frequently Asked Questions

What is CVE-2024-40890?

**UNSUPPORTED WHEN ASSIGNED** A post-authentication command injection vulnerability in the CGI program of the legacy DSL CPE Zyxel VMG4325-B10A firmware version 1.00(AAFR.4)C0_20170615 could allow an authenticated attacker to execute operating system (OS) commands on an affected device by sending a crafted HTTP POST request.

Is CVE-2024-40890 actively exploited?

Yes. CVE-2024-40890 is on the CISA Known Exploited Vulnerabilities (KEV) catalog, meaning it has been confirmed as actively exploited in the wild. CISA requires federal agencies to patch by 3/4/2025.

What is the CVSS score for CVE-2024-40890?

CVE-2024-40890 has a CVSS v3 base score of 8.8 (HIGH severity), with vector string 3.1.

Is CVE-2024-40890 affecting your environment?

Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.

CVE-2024-40890 Vulnerability — CVSS 8.8, HIGH Severity | isMalicious