CVE-2026-1460: Zyxel Routers Vulnerable to Admin Command Injection
The National Vulnerability Database reports CVE-2026-1460, a post-authentication command injection vulnerability impacting Zyxel DX3301-T0 and EX3301-T0 routers. Specifically, the flaw resides in the “DomainName” parameter within the DHCP configuration file. This vulnerability affects firmware versions up to 5.50(ABVY.7.1)C0.
An authenticated attacker with administrator privileges can exploit this vulnerability to execute arbitrary operating system commands on the affected device. With a CVSS score of 7.2 (HIGH), this vulnerability, categorized as CWE-78 (Improper Neutralization of Special Elements used in an OS Command), represents a significant risk for organizations that have not properly secured their administrative interfaces.
While this requires prior administrator access, it’s a critical escalation path. If an attacker gains initial access through other means – perhaps via a phishing campaign targeting IT staff or a weak default credential – this command injection provides full device compromise. Defenders must assume that once an adversary is on the network, they will seek to pivot and escalate privileges. This vulnerability offers a direct route to complete control over the router, which can then be used for network reconnaissance, traffic manipulation, or establishing persistence.
What This Means For You
- If your organization uses Zyxel DX3301-T0 or EX3301-T0 routers, you need to verify firmware versions immediately. Prioritize patching to versions beyond 5.50(ABVY.7.1)C0. Furthermore, rigorously audit your administrative access controls for these devices. This isn't a zero-day for the masses, but it's a critical post-authentication flaw that an attacker *will* leverage if they get a foothold. Strong password policies, MFA for administrative interfaces, and network segmentation isolating management planes are non-negotiable.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-1460: Zyxel Router Admin Command Injection via DomainName
title: CVE-2026-1460: Zyxel Router Admin Command Injection via DomainName
id: scw-2026-04-28-ai-1
status: experimental
level: critical
description: |
Detects attempts to exploit CVE-2026-1460 by targeting the DomainName parameter in the DHCP configuration of Zyxel routers. This rule specifically looks for the '/cgi-bin/zyadmind' path and the presence of 'DomainName=' in the URI query, indicative of the command injection vulnerability.
author: SCW Feed Engine (AI-generated)
date: 2026-04-28
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-1460/
tags:
- attack.execution
- attack.t1059.004
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/cgi-bin/zyadmind'
cs-uri-query|contains:
- 'DomainName='
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-1460 | Command Injection | Zyxel DX3301-T0 firmware versions through 5.50(ABVY.7.1)C0 |
| CVE-2026-1460 | Command Injection | Zyxel EX3301-T0 firmware versions through 5.50(ABVY.7.1)C0 |
| CVE-2026-1460 | Command Injection | Vulnerable parameter: 'DomainName' in DHCP configuration file |
| CVE-2026-1460 | Privilege Escalation | Requires authenticated attacker with administrator privileges |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 28, 2026 at 06:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.