Huawei Zero-Day Caused Luxembourg’s 3-Hour National Telecom Blackout

A zero-day in Huawei routers crashed Luxembourg's national telecom in July 2025 for three hours, cutting emergency services, with no CVE and no confirmed patch.
Table of Contents
    Add a header to begin generating the table of contents

    A zero-day vulnerability in Huawei enterprise router software knocked out all of Luxembourg’s phone, mobile, and emergency communications for three hours in July 2025 — and the world is only finding out now, ten months later, with no confirmed patch and no CVE assigned.

    Huawei Router Zero-Day Identified as Cause of Luxembourg’s July 2025 Nationwide Outage

    A previously undisclosed zero-day vulnerability in Huawei enterprise router firmware has been publicly identified for the first time as the cause of Luxembourg’s July 23, 2025 nationwide telecommunications outage. The incident disabled landline, 4G, 5G, and emergency communications across the country for more than three hours. POST Luxembourg, the state-owned national telecommunications provider whose infrastructure carries those services, was the direct victim.

    The 10-month gap between the incident and its public disclosure is highly unusual for a critical infrastructure event of this magnitude and raises questions about either an ongoing investigation or deliberate information control by Luxembourg authorities and Huawei.

    How the Zero-Day Triggered a Nationwide Router Reboot Loop

    The flaw involved “non-public, non-documented behavior” in Huawei router firmware — undocumented functionality that was not known to defenders or, apparently, to Huawei itself at the time of exploitation. Attackers sent specially crafted network traffic that triggered an endless router reboot loop in POST Luxembourg’s infrastructure, taking the entire national telecommunications network offline.

    When the incident occurred, Huawei acknowledged it had “never seen the attack before” and had “no immediate fix.” The attack exploited a class of behavior that exists outside Huawei’s public documentation, which means operators of the same router models would have had no basis to understand or anticipate the vulnerability from available technical specifications.

    No CVE, Unresolved Patch Status, and the Cross-Operator Risk

    As of May 20, 2026 disclosure, it remains unclear whether the vulnerability has been fully patched or whether national operators in other countries running the same Huawei router models are exposed to the same attack. No CVE has been issued for the flaw. No exploit details have been made public. The near-total absence of technical information means organizations relying on the affected Huawei equipment cannot verify their patch status through any standard security channel.

    The lack of a CVE number makes cross-operator patch verification structurally impossible: without a tracked identifier, vendors cannot query whether their Huawei support contracts cover this specific flaw, and IT teams have no advisory to reference when auditing router firmware versions.

    POST Luxembourg is described as the state-owned national telecommunications provider. An attack that takes down a national operator’s entire network — including emergency services communications — represents a critical infrastructure impact with direct public safety consequences. Emergency calls, hospital communications, and first responder coordination were all affected during the three-hour outage.

    Ten Months of Silence and What It Means for Peer Operators

    The decision to withhold public disclosure of the zero-day for ten months is extraordinary in the context of critical infrastructure security norms. Standard practice under frameworks like the EU NIS2 Directive and national cybersecurity incident reporting requirements calls for timely disclosure to enable peer operators to take protective action.

    The silence may reflect an active investigation into the attack’s origin — no attribution has been established — or operational security considerations that Luxembourg authorities and Huawei determined outweighed the disclosure benefit. Whatever the rationale, the consequence is that national telecom operators in other countries running the same Huawei infrastructure have been operating without awareness of an attack vector capable of causing a complete national outage.

    Until Huawei confirms patch availability and issues clear guidance to affected operators, organizations using the same router models face an adversary technique with no public countermeasure, no CVE-based patch verification path, and no technical description of the triggering traffic that would enable detection.

    Related Posts