Skip to content
CVSS 7.2 · HIGH

CVE-2026-1460

A post-authentication command injection vulnerability in the “DomainName” parameter of the DHCP configuration file in Zyxel DX3301-T0 and EX3301-T0 firmware versions through 5.50(ABVY.7.1)C0 could allow an authenticated attacker with administrator privileges to execute OS commands on an affected device.

View on NVD

Analysis

This vulnerability affects specific Zyxel router firmware and requires authenticated administrator access to exploit. Since it is limited to hardware models not commonly used in software development stacks and requires high privileges, it does not warrant community attention.

Severity

Score: 7.2(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: HIGH
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Weakness (CWE): CWE-78

EPSS

Probability of exploitation (next 30 days): 0.0025 (0.3%)
Percentile: 48.4%
EPSS: 2026-05-06

Technical description

A post-authentication command injection vulnerability in the “DomainName” parameter of the DHCP configuration file in Zyxel DX3301-T0 and EX3301-T0 firmware versions through 5.50(ABVY.7.1)C0 could allow an authenticated attacker with administrator privileges to execute OS commands on an affected device.

Published: 4/28/2026, 3:16:02 AM
Last modified: 4/28/2026, 8:11:56 PM

References

HomeEventsBlogResourcesTeam