Post-Authentication Command Injection Vulnerability in Zyxel NAS326 and NAS542
CVE-2023-37928
8.8HIGH
Key Information:
- Vendor
- Zyxel
- Vendor
- CVE Published:
- 30 November 2023
Summary
A post-authentication command injection vulnerability exists in the WSGI server of Zyxel NAS326 and NAS542 firmware, allowing an authenticated attacker to execute arbitrary operating system commands. By crafting a malicious URL and exploiting this weakness, attackers can potentially compromise device integrity and access sensitive information. This vulnerability highlights the importance of securing firmware updates and maintaining robust authentication protocols.
Affected Version(s)
NAS326 firmware V5.21(AAZF.14)C0
NAS542 firmware V5.21(ABAG.11)C0
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved