A directory traversal vulnerability in the web management interface of Zyxel ATP series firmware versions V5.00 through V5.38, USG FLEX series firmware versions V5.00 through V5.38, USG FLEX 50(W) series firmware versions V5.10 through V5.38, and USG20(W)-VPN series firmware vers
A directory traversal vulnerability in the web management interface of Zyxel ATP series firmware versions V5.00 through V5.38, USG FLEX series firmware versions V5.00 through V5.38, USG FLEX 50(W) series firmware versions V5.10 through V5.38, and USG20(W)-VPN series firmware versions V5.10 through V5.38 could allow an attacker to download or upload files via a crafted URL.
| Vendor | Product | Versions |
|---|---|---|
| Zyxel | ATP series firmware | versions V5.00 through V5.38 |
| Zyxel | USG FLEX series firmware | versions V5.00 through V5.38 |
| Zyxel | USG FLEX 50(W) series firmware | versions V5.10 through V5.38 |
| Zyxel | USG20(W) | VPN series firmware — versions V5.10 through V5.38 |
Yes — actively exploited. Added to the CISA KEV catalog on 2024-12-03. Ransomware use: Known.
For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.
Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:
No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.