Lionvilds (talk | contribs)
m added cargo description
 
(3 intermediate revisions by 2 users not shown)
Line 1: Line 1:
{{Stub}}{{CompanyCargo
{{Stub}}
| Founded = 1989
{{CompanyCargo
| Industry = Telecommunication
|Founded = 1989
| Logo = Zyxel Logo.png
|Industry = Telecommunication
| ParentCompany = Zyxel Group Corp
|Logo = Zyxel Logo.png
| Type = Private
|ParentCompany = Zyxel Group Corp
| Website = https://www.zyxel.com/
|Type = Private
| Description = Zyxel is a telecommunication company that was founded in 1989 in Taiwan. They are most known to create consumer grade routers but also produces enterprise equipment.
|Website = https://www.zyxel.com/
|Description = Zyxel is a telecommunication company that was founded in 1989 in Taiwan. They are most known to create consumer grade routers but also produce enterprise equipment.
}}
}}
[[wikipedia:Zyxel|Zyxel]]  is a telecommunication company that was founded in 1989 in Taiwan. They are most known to create consumer grade routers but also produces enterprise equipment.


'''Zyxel Communications Corporation is''' a subisidiary of Zyxel Group Corporation.  
'''{{Wplink|Zyxel}}''' is a telecommunication company that was founded in 1989 in Taiwan. They are most known to create consumer grade routers but also produce enterprise equipment.
 
Zyxel Communications Corporation is a subisidiary of Zyxel Group Corporation.  


==Incidents==
==Incidents==
 
===Zyxel refuses to release patches for actively exploited zero-day vulnerabilities (''2024-2025'')===
===Zyxel refuses to release patches for actively exploited zero day vulnerabilities(2024-2025)===
Zyxel released a statement announcing they had no plans to release a patch for two actively exploited flaws ({{Wplink|Zero-day vulnerability|zero-day vulnerabilities}}) in its routers, potentially affecting thousands of customers. The company advised customers to buy new routers despite the fact that the affected routers were still possible to buy online.<ref>{{Cite web |author= |title=Zyxel security advisory for command injection and insecure default credentials vulnerabilities in certain legacy DSL CPE |url=https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-insecure-default-credentials-vulnerabilities-in-certain-legacy-dsl-cpe-02-04-2025 |website=Zyxel |date=4 Feb 2025 |access-date=26 Jan 2026 |url-status=live |archive-url=http://web.archive.org/web/20251112144418/https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-insecure-default-credentials-vulnerabilities-in-certain-legacy-dsl-cpe-02-04-2025 |archive-date=12 Nov 2025}}</ref><ref>{{Cite web |last=Page |first=Carly |title=Router maker Zyxel tells customers to replace vulnerable hardware exploited by hackers |url=https://techcrunch.com/2025/02/05/router-maker-zyxel-tells-customers-to-replace-vulnerable-hardware-exploited-by-hackers/ |website=TechCrunch |date=5 Feb 2025 |access-date=26 Jan 2026 |url-status=live |archive-url=http://web.archive.org/web/20260217010206/https://techcrunch.com/2025/02/05/router-maker-zyxel-tells-customers-to-replace-vulnerable-hardware-exploited-by-hackers/ |archive-date=17 Feb 2026}}</ref><ref>{{Cite web |last=Whittaker |first=Zack |title=Zack Whittaker on Mastodon |url=https://mastodon.social/@zackwhittaker/113951421812871589 |website=Mastodon |date=5 Feb 2025 |access-date=26 Jan 2026 |url-status=live |archive-url=http://web.archive.org/web/20250226161148/https://mastodon.social/@zackwhittaker/113951421812871589 |archive-date=26 Feb 2025}}</ref>
Zyxel released a statement where they have no plans to release a patch for two actively exploited flaws in its routers, potentially affecting thousands of customers.
 
Zyxel advised customers to buy new routers despite the fact that the affected routers were still possible to buy online.<ref>{{Cite web |date=2025-02-04 |title=Zyxel security advisory for command injection and insecure default credentials vulnerabilities in certain legacy DSL CPE |url=https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-insecure-default-credentials-vulnerabilities-in-certain-legacy-dsl-cpe-02-04-2025 |url-status=live |archive-url=https://web.archive.org/web/20250209091247/https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-insecure-default-credentials-vulnerabilities-in-certain-legacy-dsl-cpe-02-04-2025 |archive-date=2025-02-09 |website=Zyxel}}</ref><ref>{{Cite web |last=Page |first=Carly |date=5 Feb 2025 |title=Router maker Zyxel tells customers to replace vulnerable hardware exploited by hackers |url=https://techcrunch.com/2025/02/05/router-maker-zyxel-tells-customers-to-replace-vulnerable-hardware-exploited-by-hackers/ |url-status=live |archive-url=https://web.archive.org/web/20250205105002/https://techcrunch.com/2025/02/05/router-maker-zyxel-tells-customers-to-replace-vulnerable-hardware-exploited-by-hackers/ |archive-date=5 Feb 2025 |access-date=28 Mar 2025 |website=TechCrunch}}</ref><ref>{{Cite web |last=Whittaker |first=Zack |date=5 Feb 2025 |title=Wow. Router maker Zyxel says it has no plans to release a patch for two *actively exploited* flaws in its routers affecting potentially thousands of customers. Instead, Zyxel is advising customers to rip out affected devices and buy new routers. However, the affected buggy routers are still available for purchase. |url=https://mastodon.social/@zackwhittaker/113951421812871589 |url-status=live |archive-url=https://web.archive.org/web/20250226161148/https://mastodon.social/@zackwhittaker/113951421812871589 |archive-date=26 Feb 2025 |access-date=28 Mar 2025 |website=Mastodon}}</ref>


==References==
==References==
{{reflist}}
{{Reflist}}


[[Category:{{PAGENAME}}]]
[[Category:{{PAGENAME}}]]