A vulnerability in the TFTP client of Zyxel GS1900 series firmware, XGS1210 series firmware, and XGS1250 series firmware, which could allow an authenticated LAN user to execute arbitrary OS commands via the GUI of the vulnerable device.
References
Link | Resource |
---|---|
https://www.zyxel.com/support/Zyxel_security_advisory_for_OS_command_injection_vulnerabilities_of_switches.shtml | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
Configuration 12 (hide)
AND |
|
Configuration 13 (hide)
AND |
|
Configuration 14 (hide)
AND |
|
History
07 Jan 2022, 16:59
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:zyxel:xgs1250-12:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:gs1900-48hpv2:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:gs1900-16_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:gs1900-24hp_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:gs1900-48hpv2_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:gs1900-8:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:gs1900-10hp:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:xgs1250-12_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:gs1900-24e_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:gs1900-48hp:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:gs1900-48_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:gs1900-16:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:gs1900-24hpv2:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:gs1900-48hp_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:gs1900-8hp:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:gs1900-24_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:gs1900-24ep:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:gs1900-24e:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:gs1900-24hp:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:xgs1210-12_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:gs1900-8_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:gs1900-24ep_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:gs1900-24:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:gs1900-8hp_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:xgs1210-12:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:gs1900-24hpv2_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:gs1900-48:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:gs1900-10hp_firmware:*:*:*:*:*:*:*:* |
|
References | (CONFIRM) https://www.zyxel.com/support/Zyxel_security_advisory_for_OS_command_injection_vulnerabilities_of_switches.shtml - Patch, Vendor Advisory | |
CWE | CWE-78 | |
CVSS |
v2 : v3 : |
v2 : 7.7
v3 : 8.0 |
28 Dec 2021, 16:15
Type | Values Removed | Values Added |
---|---|---|
Summary | A vulnerability in the TFTP client of Zyxel GS1900 series firmware, XGS1210 series firmware, and XGS1250 series firmware, which could allow an authenticated LAN user to execute arbitrary OS commands via the GUI of the vulnerable device. |
28 Dec 2021, 12:35
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-12-28 11:15
Updated : 2024-02-04 22:08
NVD link : CVE-2021-35031
Mitre link : CVE-2021-35031
CVE.ORG link : CVE-2021-35031
JSON object : View
Products Affected
zyxel
- gs1900-24e_firmware
- gs1900-16_firmware
- gs1900-24hpv2
- gs1900-8
- gs1900-24hpv2_firmware
- gs1900-24ep_firmware
- gs1900-48hp_firmware
- gs1900-48hpv2_firmware
- gs1900-24e
- gs1900-48_firmware
- gs1900-10hp_firmware
- xgs1210-12_firmware
- gs1900-48hp
- gs1900-8hp_firmware
- xgs1210-12
- gs1900-16
- gs1900-24_firmware
- gs1900-24
- gs1900-24ep
- xgs1250-12_firmware
- gs1900-24hp_firmware
- gs1900-10hp
- gs1900-48hpv2
- gs1900-8_firmware
- gs1900-24hp
- gs1900-48
- gs1900-8hp
- xgs1250-12
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')