Zyxel: Difference between revisions

Reworded introductory sentences, added punctuation
 
(2 intermediate revisions by one other user not shown)
Line 1: Line 1:
{{Stub}}
{{Stub}}{{CompanyCargo
{{InfoboxCompany
| Founded = 1989
| Name = {{PAGENAME}}
| Industry = Telecommunication
| Type =Wholly-owned subsidiaries
| Logo = Zyxel Logo.png
| Founded =1989
| ParentCompany = Zyxel Group Corp
| Industry =Networking Equipment
| Type = Private
| Official Website =https://www.zyxel.com
| Website = https://www.zyxel.com/
| Logo =Zyxel Logo.png
}}
}}
'''[[wikipedia:Zyxel|Zyxel]]''' is a router manufacturer. Zyxel says they have no plans to release a patch for two actively exploited flaws in its routers, potentially affecting thousands of customers.
[[wikipedia:Zyxel|Zyxel]] is a telecommunication company that was founded in 1989 in Taiwan. They are most known to create consumer grade routers but also produces enterprise equipment.


Instead, Zyxel is advising customers to rip out affected devices and buy new routers. However, the affected buggy routers are still available for purchase.<ref>{{Cite web |last=Page |first=Carly |date=5 Feb 2025 |title=Router maker Zyxel tells customers to replace vulnerable hardware exploited by hackers |url=https://techcrunch.com/2025/02/05/router-maker-zyxel-tells-customers-to-replace-vulnerable-hardware-exploited-by-hackers/ |url-status=live |access-date=28 Mar 2025 |website=TechCrunch}}</ref><ref>{{Cite web |last=Whittaker |first=Zack |date=5 Feb 2025 |title=Wow. Router maker Zyxel says it has no plans to release a patch for two *actively exploited* flaws in its routers affecting potentially thousands of customers. Instead, Zyxel is advising customers to rip out affected devices and buy new routers. However, the affected buggy routers are still available for purchase. |url=https://mastodon.social/@zackwhittaker/113951421812871589 |url-status=live |access-date=28 Mar 2025 |website=Mastodon}}</ref>
'''Zyxel Communications Corporation is''' a subisidiary of Zyxel Group Corporation.  
 
==Consumer impact summary==
''Overview of concerns that arise from the company's conduct regarding (if applicable):''
*''User Freedom''
*''User Privacy''
*''Business Model''
*''Market Control''


==Incidents==
==Incidents==
If the company page is short enough and/or the incident is not deserving of it own page add incidents below in a sub section including the points outlined in [[Consumer_Action_Taskforce:Sample/Incident/Help]].
If the company has various incidents listed and/or the page is getting too long add the section below:
This is a list of all consumer protection incidents this company is involved in. Any incidents not mentioned here can be found in the [[:Category:{{FULLPAGENAME}}|{{PAGENAME}} category]].
*[[Example incident one]]'' (''date''):''Short summary of the incident (could be the same as the summary preceding the article).
*[[Example incident two]]'' (''date''):''
...


==Products==
===Zyxel refuses to release patches for actively exploited zero day vulnerabilities(2024-2025)===
This is a list of the company's product lines with articles on this wiki.
Zyxel released a statement where they have no plans to release a patch for two actively exploited flaws in its routers, potentially affecting thousands of customers.
*''[[Example product line one]]'' (''release date''): ''Short summary of the product's incidents.''
*''[[Example product line two]]'' (''release date''):


==See also==
Zyxel advised customers to buy new routers despite the fact that the affected routers were still possible to buy online.<ref>{{Cite web |date=2025-02-04 |title=Zyxel security advisory for command injection and insecure default credentials vulnerabilities in certain legacy DSL CPE |url=https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-insecure-default-credentials-vulnerabilities-in-certain-legacy-dsl-cpe-02-04-2025 |url-status=live |archive-url=https://web.archive.org/web/20250209091247/https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-insecure-default-credentials-vulnerabilities-in-certain-legacy-dsl-cpe-02-04-2025 |archive-date=2025-02-09 |website=Zyxel}}</ref><ref>{{Cite web |last=Page |first=Carly |date=5 Feb 2025 |title=Router maker Zyxel tells customers to replace vulnerable hardware exploited by hackers |url=https://techcrunch.com/2025/02/05/router-maker-zyxel-tells-customers-to-replace-vulnerable-hardware-exploited-by-hackers/ |url-status=live |access-date=28 Mar 2025 |website=TechCrunch}}</ref><ref>{{Cite web |last=Whittaker |first=Zack |date=5 Feb 2025 |title=Wow. Router maker Zyxel says it has no plans to release a patch for two *actively exploited* flaws in its routers affecting potentially thousands of customers. Instead, Zyxel is advising customers to rip out affected devices and buy new routers. However, the affected buggy routers are still available for purchase. |url=https://mastodon.social/@zackwhittaker/113951421812871589 |url-status=live |access-date=28 Mar 2025 |website=Mastodon}}</ref>
''Link to relevant theme articles or companies with similar incidents.''


==References==
==References==