{"uuid": "f8f3a56d-de14-4abc-abd1-538e3a498ce4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-11730", "type": "published-proof-of-concept", "source": "https://t.me/P0x3k_1N73LL1G3NC3/261", "content": "CVE-2025-11730: Post\u2011authentication Remote Code Execution via DDNS configuration in ZYXEL ATP/USG Series (V5.41)\n\nBy configuring a DDNS Profile with a crafted URL, it is possible to obtain a root shell.\n\nExploit: https://github.com/rainpwn/exploits/blob/main/zyxel/rainpwn_cve-2025-11730_ddns_rce.py", "creation_timestamp": "2026-02-08T08:26:00.000000Z"}