Post-Authentication Command Injection Vulnerability in Zyxel NAS Products
CVE-2023-5372

7.2HIGH

Key Information:

Vendor
Zyxel
Vendor
CVE Published:
30 January 2024

Summary

An authenticated post-authentication command injection vulnerability exists in the Zyxel NAS326 and NAS542 firmware, allowing attackers with administrator privileges to execute arbitrary operating system commands. This exploitation can be achieved by navigating to the web management interface of an affected device and sending a specially crafted query parameter within the URL. The affected firmware versions enhance the risk by not adequately validating input, thereby providing a potential attack vector for malicious actors.

Affected Version(s)

NAS326 firmware <= V5.21(AAZF.15)C0

NAS542 firmware <= V5.21(ABAG.12)C0

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.