Post-Authentication Command Injection in Zyxel NAS326 Firmware
CVE-2023-27988
7.2HIGH
Summary
Zyxel NAS326 devices running firmware versions before V5.21(AAZF.13)C0 are susceptible to a post-authentication command injection vulnerability. This security flaw enables an authenticated attacker with administrative access to execute arbitrary operating system commands remotely on the affected device, potentially compromising its integrity and security. Proper mitigations and updates are crucial to safeguard against this vulnerability.
Affected Version(s)
NAS326 firmware < V5.21(AAZF.13)C0
References
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved