A spokesperson for POST Luxembourg, the public operator affected by the incident, confirmed that it stemmed from an undocumented software flaw.

Paul Rausch, head of communications at POST Luxembourg, confirmed on May 20, 2026, that the outage affecting the public telecoms operator in July 2025 was the result of a 0-day attack targeting Huawei routers. The DDoS offensive caused an interruption of POST’s fixed and mobile services. It relied on specially crafted network traffic designed to force Huawei professional routers into a reboot loop.

According to Paul Rausch, the attack exploited a “non-public and undocumented” software vulnerability for which no patch was available at the time. POST provided Huawei with technical information about the flaw, but ten months after the incident, the manufacturer has still not publicly disclosed it through a CVE identifier.

Asked about this decision, Huawei declined to comment. The manufacturer also did not specify whether the vulnerability had been fully fixed, how many operators may have been affected, or whether similar routers remain exposed.

Stay tuned in real time
Subscribe to
the newsletter
By providing your email address you agree to receive the Incyber newsletter and you have read our privacy policy. You can unsubscribe at any time by clicking on the unsubscribe link in all our emails.
Stay tuned in real time
Subscribe to
the newsletter
By providing your email address you agree to receive the Incyber newsletter and you have read our privacy policy. You can unsubscribe at any time by clicking on the unsubscribe link in all our emails.