A OS command injection vulnerability in the CGI program of Zyxel USG FLEX 100(W) firmware versions 5.00 through 5.21 Patch 1, USG FLEX 200 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 500 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 700 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 50(W) firmware versions 5.10 through 5.21 Patch 1, USG20(W)-VPN firmware versions 5.10 through 5.21 Patch 1, ATP series firmware versions 5.10 through 5.21 Patch 1, VPN series firmware versions 4.60 through 5.21 Patch 1, which could allow an attacker to modify specific files and then execute some OS commands on a vulnerable device.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/167176/Zyxel-Remote-Command-Execution.html | Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/167182/Zyxel-Firewall-ZTP-Unauthenticated-Command-Injection.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/167372/Zyxel-USG-FLEX-5.21-Command-Injection.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/168202/Zyxel-Firewall-SUID-Binary-Privilege-Escalation.html | Exploit Third Party Advisory |
https://www.zyxel.com/support/Zyxel-security-advisory-for-OS-command-injection-vulnerability-of-firewalls.shtml | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
Configuration 12 (hide)
AND |
|
Configuration 13 (hide)
AND |
|
Configuration 14 (hide)
AND |
|
Configuration 15 (hide)
AND |
|
Configuration 16 (hide)
AND |
|
History
19 Oct 2022, 18:32
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) http://packetstormsecurity.com/files/167372/Zyxel-USG-FLEX-5.21-Command-Injection.html - Exploit, Third Party Advisory, VDB Entry | |
References | (MISC) http://packetstormsecurity.com/files/168202/Zyxel-Firewall-SUID-Binary-Privilege-Escalation.html - Exploit, Third Party Advisory |
31 Aug 2022, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
03 Jun 2022, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
23 May 2022, 14:17
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-78 | |
CVSS |
v2 : v3 : |
v2 : 10.0
v3 : 9.8 |
References | (MISC) http://packetstormsecurity.com/files/167176/Zyxel-Remote-Command-Execution.html - Third Party Advisory, VDB Entry | |
References | (MISC) http://packetstormsecurity.com/files/167182/Zyxel-Firewall-ZTP-Unauthenticated-Command-Injection.html - Exploit, Third Party Advisory, VDB Entry | |
References | (CONFIRM) https://www.zyxel.com/support/Zyxel-security-advisory-for-OS-command-injection-vulnerability-of-firewalls.shtml - Vendor Advisory | |
CPE | cpe:2.3:h:zyxel:atp100w:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_50w:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vpn1000:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_200_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp100_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100w_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vpn300:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_700_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp100w_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:vpn50_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:atp800:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp700_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg20w-vpn:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_100w:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:vpn300_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp500_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vpn100:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg20w-vpn_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:vpn1000_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:atp100:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_50w_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:atp200:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vpn50:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:atp700:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp800_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:atp500:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:vpn100_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp200_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_700:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_500:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_500_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_200:-:*:*:*:*:*:*:* |
16 May 2022, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
12 May 2022, 15:34
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-05-12 14:15
Updated : 2024-02-04 22:29
NVD link : CVE-2022-30525
Mitre link : CVE-2022-30525
CVE.ORG link : CVE-2022-30525
JSON object : View
Products Affected
zyxel
- usg_flex_200_firmware
- atp100w_firmware
- atp800_firmware
- vpn50
- atp700
- atp800
- usg_flex_50w_firmware
- usg_flex_200
- atp200_firmware
- vpn300
- atp500
- vpn100
- vpn1000_firmware
- usg20w-vpn
- atp100w
- atp100
- atp500_firmware
- usg_flex_500_firmware
- usg20w-vpn_firmware
- vpn100_firmware
- vpn50_firmware
- usg_flex_50w
- atp200
- usg_flex_500
- usg_flex_700_firmware
- usg_flex_100w_firmware
- vpn1000
- usg_flex_700
- usg_flex_100w
- atp100_firmware
- atp700_firmware
- vpn300_firmware
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')