Zyxel Devices Under Attack: The Zero-Day Exploit Giving Hackers a Field Day
A zero-day vulnerability is impacting Zyxel CPE Series devices, with attackers actively exploiting it to execute arbitrary commands. Known as CVE-2024-40891, this flaw hasn’t been publicly disclosed or patched. Users should filter traffic and restrict admin access to trusted IPs to mitigate risks.

Hot Take:
Looks like Zyxel devices have found themselves stuck in a zero-day Groundhog Day loop! With hackers on a Telnet joyride, these devices are basically sitting ducks waiting to be plucked. If your router starts playing the theme from “Mission: Impossible,” it might be time to pull the plug and call in the cybersecurity cavalry.
Key Points:
- Zyxel CPE Series devices are vulnerable to a critical zero-day exploit, CVE-2024-40891.
- The flaw allows attackers to execute arbitrary commands, compromising affected systems.
- Active exploitation attempts have been traced back to numerous IPs, mostly in Taiwan.
- A related vulnerability, CVE-2024-40890, is also under scrutiny, though HTTP-based.
- Users should filter unusual HTTP requests and restrict admin interface access.
Already a member? Log in here