Crafted HTTP POST request can execute OS commands
CVE-2024-6342
Summary
A command injection vulnerability exists in the export-cgi program within Zyxel NAS326 and NAS542 firmware, allowing unauthenticated attackers to execute operating system commands. This can be exploited by sending crafted HTTP POST requests, potentially compromising the integrity and operational functionality of the affected devices. Users of the NAS326 and NAS542 models should review the firmware versions to mitigate risks associated with this vulnerability.
Affected Version(s)
NAS326 firmware <= V5.21(AAZF.18)C0
NAS542 firmware <= V5.21(ABAG.15)C0
Get notified when SecurityVulnerability.io launches alerting 🔔
Well keep you posted 📧
News Articles
Zyxel fixes critical command injection flaw in EOL NAS devices (CVE-2024-6342) - Help Net Security
Users of Zyxel NAS devices are urged to implement hotfixes for an easily exploited command injection vulnerability (CVE-2024-6342).
5 months ago
References
CVSS V3.1
Timeline
- 📰
First article discovered by Help Net Security
Vulnerability published
Vulnerability Reserved