CVE-2025-6599

Dec. 16, 2025, 9:19 p.m.

5.3
Medium

Description

An uncontrolled resource consumption vulnerability in the web server of Zyxel DX3301-T0 firmware version 5.50(ABVY.6.3)C0 and earlier could allow an attacker to perform Slowloris‑style denial‑of‑service (DoS) attacks. Such attacks may temporarily block legitimate HTTP requests and partially disrupt access to the web management interface, while other networking services remain unaffected.

Product(s) Impacted

Vendor Product Versions
Zyxel
  • Lte3301-plus Firmware
  • Lte3301-plus
  • Nr5103 Firmware
  • Nr5103
  • Nr5103e Firmware
  • Nr5103e
  • Nr5309 Firmware
  • Nr5309
  • Nr7302 Firmware
  • Nr7302
  • Nr7303 Firmware
  • Nr7303
  • Nebula Fwa505 Firmware
  • Nebula Fwa505
  • Nebula Fwa510 Firmware
  • Nebula Fwa510
  • Nebula Fwa515 Firmware
  • Nebula Fwa515
  • Nebula Fwa710 Firmware
  • Nebula Fwa710
  • Dm4200-b0 Firmware
  • Dm4200-b0
  • Dx3300-t0 Firmware
  • Dx3300-t0
  • Dx3300-t1 Firmware
  • Dx3300-t1
  • Dx3301-t0 Firmware
  • Dx3301-t0
  • Dx4510-b1 Firmware
  • Dx4510-b1
  • Dx5401-b0 Firmware
  • Dx5401-b0
  • Dx5401-b1 Firmware
  • Dx5401-b1
  • Ee3301-00 Firmware
  • Ee3301-00
  • Ee5301-00 Firmware
  • Ee5301-00
  • Ee6510-10 Firmware
  • Ee6510-10
  • Ex3300-t0 Firmware
  • Ex3300-t0
  • Ex3300-t1 Firmware
  • Ex3300-t1
  • Ex3301-t0 Firmware
  • Ex3301-t0
  • Ex3500-t0 Firmware
  • Ex3500-t0
  • Ex3501-t0 Firmware
  • Ex3501-t0
  • Ex3600-t0 Firmware
  • Ex3600-t0
  • Ex5401-b0 Firmware
  • Ex5401-b0
  • Ex5401-b1 Firmware
  • Ex5401-b1
  • Ex5501-b0 Firmware
  • Ex5501-b0
  • Ex5510-b0 Firmware
  • Ex5510-b0
  • Ex5512-t0 Firmware
  • Ex5512-t0
  • Ex5601-t0 Firmware
  • Ex5601-t0
  • Ex5601-t1 Firmware
  • Ex5601-t1
  • Ex7501-b0 Firmware
  • Ex7501-b0
  • Ex7710-b0 Firmware
  • Ex7710-b0
  • Emg3525-t50b Firmware
  • Emg3525-t50b
  • Emg5523-t50b Firmware
  • Emg5523-t50b
  • Emg5723-t50k Firmware
  • Emg5723-t50k
  • Emg6726-b10a Firmware
  • Emg6726-b10a
  • Gm4100-b0 Firmware
  • Gm4100-b0
  • Vmg3625-t50b Firmware
  • Vmg3625-t50b
  • Vmg3927-b50b Firmware
  • Vmg3927-b50b
  • Vmg3927-t50k Firmware
  • Vmg3927-t50k
  • Vmg4005-b50a Firmware
  • Vmg4005-b50a
  • Vmg4005-b60a Firmware
  • Vmg4005-b60a
  • Vmg4005-b50b Firmware
  • Vmg4005-b50b
  • Vmg4927-b50a Firmware
  • Vmg4927-b50a
  • Vmg8623-t50b Firmware
  • Vmg8623-t50b
  • Vmg8825-t50k Firmware
  • Vmg8825-t50k
  • Ax7501-b0 Firmware
  • Ax7501-b0
  • Ax7501-b1 Firmware
  • Ax7501-b1
  • Pe3301-00 Firmware
  • Pe3301-00
  • Pe5301-01 Firmware
  • Pe5301-01
  • Pm3100-t0 Firmware
  • Pm3100-t0
  • Pm5100-t0 Firmware
  • Pm5100-t0
  • Pm7500-00 Firmware
  • Pm7500-00
  • Pm7300-t0 Firmware
  • Pm7300-t0
  • Px3321-t1 Firmware
  • Px3321-t1
  • Px5301-t0 Firmware
  • Px5301-t0
  • Scr 50axe Firmware
  • Scr 50axe
  • We3300-00 Firmware
  • We3300-00
  • Wx3100-t0 Firmware
  • Wx3100-t0
  • Wx3401-b0 Firmware
  • Wx3401-b0
  • Wx3401-b1 Firmware
  • Wx3401-b1
  • Wx5600-t0 Firmware
  • Wx5600-t0
  • Wx5610-b0 Firmware
  • Wx5610-b0
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -

Weaknesses

Common security weaknesses mapped to this vulnerability.

CWE-400
Uncontrolled Resource Consumption
The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.

*CPE(s)

Affected systems and software identified for this CVE.

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
o zyxel lte3301-plus_firmware / / / / / / / /
h zyxel lte3301-plus - / / / / / / /
o zyxel nr5103_firmware / / / / / / / /
h zyxel nr5103 - / / / / / / /
o zyxel nr5103e_firmware / / / / / / / /
h zyxel nr5103e - / / / / / / /
o zyxel nr5309_firmware / / / / / / / /
h zyxel nr5309 - / / / / / / /
o zyxel nr7302_firmware / / / / / / / /
h zyxel nr7302 - / / / / / / /
o zyxel nr7303_firmware / / / / / / / /
h zyxel nr7303 - / / / / / / /
o zyxel nebula_fwa505_firmware / / / / / / / /
h zyxel nebula_fwa505 - / / / / / / /
o zyxel nebula_fwa510_firmware / / / / / / / /
h zyxel nebula_fwa510 - / / / / / / /
o zyxel nebula_fwa515_firmware / / / / / / / /
h zyxel nebula_fwa515 - / / / / / / /
o zyxel nebula_fwa710_firmware / / / / / / / /
h zyxel nebula_fwa710 - / / / / / / /
o zyxel dm4200-b0_firmware / / / / / / / /
h zyxel dm4200-b0 - / / / / / / /
o zyxel dx3300-t0_firmware / / / / / / / /
h zyxel dx3300-t0 - / / / / / / /
o zyxel dx3300-t1_firmware / / / / / / / /
h zyxel dx3300-t1 - / / / / / / /
o zyxel dx3301-t0_firmware / / / / / / / /
h zyxel dx3301-t0 - / / / / / / /
o zyxel dx4510-b1_firmware / / / / / / / /
h zyxel dx4510-b1 - / / / / / / /
o zyxel dx5401-b0_firmware / / / / / / / /
h zyxel dx5401-b0 - / / / / / / /
o zyxel dx5401-b1_firmware / / / / / / / /
h zyxel dx5401-b1 - / / / / / / /
o zyxel ee3301-00_firmware / / / / / / / /
h zyxel ee3301-00 - / / / / / / /
o zyxel ee5301-00_firmware / / / / / / / /
h zyxel ee5301-00 - / / / / / / /
o zyxel ee6510-10_firmware / / / / / / / /
h zyxel ee6510-10 - / / / / / / /
o zyxel ex3300-t0_firmware / / / / / / / /
h zyxel ex3300-t0 - / / / / / / /
o zyxel ex3300-t0_firmware / / / / / / / /
h zyxel ex3300-t0 - / / / / / / /
o zyxel ex3300-t1_firmware / / / / / / / /
h zyxel ex3300-t1 - / / / / / / /
o zyxel ex3301-t0_firmware / / / / / / / /
h zyxel ex3301-t0 - / / / / / / /
o zyxel ex3500-t0_firmware / / / / / / / /
h zyxel ex3500-t0 - / / / / / / /
o zyxel ex3501-t0_firmware / / / / / / / /
h zyxel ex3501-t0 - / / / / / / /
o zyxel ex3600-t0_firmware / / / / / / / /
h zyxel ex3600-t0 - / / / / / / /
o zyxel ex5401-b0_firmware / / / / / / / /
h zyxel ex5401-b0 - / / / / / / /
o zyxel ex5401-b1_firmware / / / / / / / /
h zyxel ex5401-b1 - / / / / / / /
o zyxel ex5501-b0_firmware / / / / / / / /
h zyxel ex5501-b0 - / / / / / / /
o zyxel ex5510-b0_firmware / / / / / / / /
h zyxel ex5510-b0 - / / / / / / /
o zyxel ex5512-t0_firmware / / / / / / / /
h zyxel ex5512-t0 - / / / / / / /
o zyxel ex5601-t0_firmware / / / / / / / /
h zyxel ex5601-t0 - / / / / / / /
o zyxel ex5601-t1_firmware / / / / / / / /
h zyxel ex5601-t1 - / / / / / / /
o zyxel ex7501-b0_firmware / / / / / / / /
h zyxel ex7501-b0 - / / / / / / /
o zyxel ex7710-b0_firmware / / / / / / / /
h zyxel ex7710-b0 - / / / / / / /
o zyxel emg3525-t50b_firmware / / / / / / / /
h zyxel emg3525-t50b - / / / / / / /
o zyxel emg5523-t50b_firmware / / / / / / / /
h zyxel emg5523-t50b - / / / / / / /
o zyxel emg5723-t50k_firmware / / / / / / / /
h zyxel emg5723-t50k - / / / / / / /
o zyxel emg6726-b10a_firmware / / / / / / / /
h zyxel emg6726-b10a - / / / / / / /
o zyxel gm4100-b0_firmware / / / / / / / /
h zyxel gm4100-b0 - / / / / / / /
o zyxel vmg3625-t50b_firmware / / / / / / / /
h zyxel vmg3625-t50b - / / / / / / /
o zyxel vmg3927-b50b_firmware / / / / / / / /
h zyxel vmg3927-b50b - / / / / / / /
o zyxel vmg3927-t50k_firmware / / / / / / / /
h zyxel vmg3927-t50k - / / / / / / /
o zyxel vmg4005-b50a_firmware / / / / / / / /
h zyxel vmg4005-b50a - / / / / / / /
o zyxel vmg4005-b60a_firmware / / / / / / / /
h zyxel vmg4005-b60a - / / / / / / /
o zyxel vmg4005-b50b_firmware / / / / / / / /
h zyxel vmg4005-b50b - / / / / / / /
o zyxel vmg4927-b50a_firmware / / / / / / / /
h zyxel vmg4927-b50a - / / / / / / /
o zyxel vmg8623-t50b_firmware / / / / / / / /
h zyxel vmg8623-t50b - / / / / / / /
o zyxel vmg8825-t50k_firmware / / / / / / / /
h zyxel vmg8825-t50k - / / / / / / /
o zyxel ax7501-b0_firmware / / / / / / / /
h zyxel ax7501-b0 - / / / / / / /
o zyxel ax7501-b1_firmware / / / / / / / /
h zyxel ax7501-b1 - / / / / / / /
o zyxel pe3301-00_firmware / / / / / / / /
h zyxel pe3301-00 - / / / / / / /
o zyxel pe5301-01_firmware / / / / / / / /
h zyxel pe5301-01 - / / / / / / /
o zyxel pm3100-t0_firmware / / / / / / / /
h zyxel pm3100-t0 - / / / / / / /
o zyxel pm5100-t0_firmware / / / / / / / /
h zyxel pm5100-t0 - / / / / / / /
o zyxel pm7500-00_firmware / / / / / / / /
h zyxel pm7500-00 - / / / / / / /
o zyxel pm7300-t0_firmware / / / / / / / /
h zyxel pm7300-t0 - / / / / / / /
o zyxel px3321-t1_firmware / / / / / / / /
h zyxel px3321-t1 - / / / / / / /
o zyxel px3321-t1_firmware / / / / / / / /
h zyxel px3321-t1 - / / / / / / /
o zyxel px5301-t0_firmware / / / / / / / /
h zyxel px5301-t0 - / / / / / / /
o zyxel scr_50axe_firmware / / / / / / / /
h zyxel scr_50axe - / / / / / / /
o zyxel we3300-00_firmware / / / / / / / /
h zyxel we3300-00 - / / / / / / /
o zyxel wx3100-t0_firmware / / / / / / / /
h zyxel wx3100-t0 - / / / / / / /
o zyxel wx3401-b0_firmware / / / / / / / /
h zyxel wx3401-b0 - / / / / / / /
o zyxel wx3401-b1_firmware / / / / / / / /
h zyxel wx3401-b1 - / / / / / / /
o zyxel wx5600-t0_firmware / / / / / / / /
h zyxel wx5600-t0 - / / / / / / /
o zyxel wx5610-b0_firmware / / / / / / / /
h zyxel wx5610-b0 - / / / / / / /

CVSS Score

5.3 / 10

CVSS Data - 3.1

  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: LOW
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

    View Vector String

Timeline

Published: Nov. 18, 2025, 2:15 a.m.
Last Modified: Dec. 16, 2025, 9:19 p.m.

Status : Analyzed

CVE has had analysis completed and all data associations made.

More info

Source

security@zyxel.com.tw

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.