The Zyxel WRE6505 v2 is a consumer-grade WiFi range extender. During setup, it scans the air to display a list of available networks (a.k.a. “SSID”s). Nothing exotic about that; your laptop does this all the time.
What is often overlooked here: the IEEE 802.11 standard that governs how these SSIDs are constructed, dictates that, (at the raw frame level, with appropriate tooling) a valid SSID could contain up to 32 bytes of arbitrary data. WiFi clients are free to interpret this data however they see fit and truncating the SSID from byte 33 onward is standard practice.
This comes with a few interesting side effects regarding assumptions on how “well-behaved” the broadcasting device is:
Weaponization of this last point is what ultimately led to Zyxel issuing CVE-2026-6058 to me for this finding.
When the Zyxel device formats its scan results into a JSON object and sends them to the browser, it fails to correctly handle these control characters. If a nearby access point broadcasts an SSID containing a newline character (0x0A), the device injects it as a literal linebreak into the JSON object. The browser’s parser immediately rejects the malformed response, but the frontend UI does not warn the user that this has happened.
Consequently, the network discovery page is infinitely stuck on a “Scanning…” spinner. If the device is brand new, this effectively soft-bricks the device for its intended purpose. A similar thing happens when the device has already been set up: after displaying the “Scanning…” spinner for two minutes the management UI defaults to displaying an empty page. When the person managing the device wants to change the upstream network, they are effectively blocked from doing so.
An attacker simply needs to run a rogue access point nearby with a malformed SSID which is trivial using a small Raspberry Pi running hostapd. Any vulnerable device in radio range is subjected to this management-plane-DoS until the rogue device is removed. The attacker never has to authenticate or even communicate directly with the target.