Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
Configuration 5 (hide)
| AND |
|
Configuration 6 (hide)
| AND |
|
Configuration 7 (hide)
| AND |
|
Configuration 8 (hide)
| AND |
|
Configuration 9 (hide)
| AND |
|
Configuration 10 (hide)
| AND |
|
Configuration 11 (hide)
| AND |
|
Configuration 12 (hide)
| AND |
|
Configuration 13 (hide)
| AND |
|
Configuration 14 (hide)
| AND |
|
Configuration 15 (hide)
| AND |
|
Configuration 16 (hide)
| AND |
|
Configuration 17 (hide)
| AND |
|
Configuration 18 (hide)
| AND |
|
Configuration 19 (hide)
| AND |
|
27 Oct 2025, 17:05
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-28771 - US Government Resource |
21 Oct 2025, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 20:19
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 19:20
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Nov 2024, 07:55
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://packetstormsecurity.com/files/172820/Zyxel-IKE-Packet-Decoder-Unauthenticated-Remote-Code-Execution.html - Exploit, Third Party Advisory | |
| References | () https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-remote-command-injection-vulnerability-of-firewalls - Vendor Advisory |
09 Jun 2023, 18:12
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:zyxel:usg_flex_50_firmware:*:*:*:*:*:*:*:* | |
| References | (MISC) http://packetstormsecurity.com/files/172820/Zyxel-IKE-Packet-Decoder-Unauthenticated-Remote-Code-Execution.html - Exploit, Third Party Advisory |
09 Jun 2023, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
07 Jun 2023, 18:20
| Type | Values Removed | Values Added |
|---|---|---|
| CPE |
04 May 2023, 18:46
| Type | Values Removed | Values Added |
|---|---|---|
| References | (CONFIRM) https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-remote-command-injection-vulnerability-of-firewalls - Vendor Advisory | |
| CPE | cpe:2.3:o:zyxel:usg_flex_100w_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:zywall_usg_100:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp100w_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:vpn300_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:zywall_usg_310_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_200:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp200_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vpn50:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:zywall_usg_310:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:atp500:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp500_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_700:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_50w:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vpn300:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_500_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vpn100:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:zywall_usg_100_firmware:4.73:-:*:*:*:*:*:* cpe:2.3:o:zyxel:atp800_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:atp800:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_50_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:atp100:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_50w_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vpn1000:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:vpn50_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp700_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:atp100w:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_50:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:atp200:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_100:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_200_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:atp700:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:vpn100_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:zywall_usg_100_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_700_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_500:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:vpn1000_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:atp100_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_100w:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:zywall_usg_310_firmware:4.73:-:*:*:*:*:*:* |
|
| CWE | CWE-78 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
25 Apr 2023, 02:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Published : 2023-04-25 02:15
Updated : 2025-10-27 17:05
NVD link : CVE-2023-28771
Mitre link : CVE-2023-28771
CVE.ORG link : CVE-2023-28771
JSON object : View
zyxel
- usg_flex_100
- atp700_firmware
- vpn50_firmware
- vpn100
- atp200
- atp100_firmware
- vpn1000_firmware
- zywall_usg_100
- usg_flex_50_firmware
- vpn300
- usg_flex_200_firmware
- usg_flex_700_firmware
- usg_flex_50w_firmware
- atp700
- usg_flex_200
- vpn1000
- usg_flex_100w_firmware
- vpn300_firmware
- zywall_usg_310_firmware
- usg_flex_100_firmware
- atp100w
- zywall_usg_310
- vpn100_firmware
- atp100w_firmware
- usg_flex_100w
- usg_flex_50w
- atp500_firmware
- atp800_firmware
- usg_flex_50
- usg_flex_500_firmware
- usg_flex_500
- atp800
- zywall_usg_100_firmware
- vpn50
- atp500
- atp200_firmware
- atp100
- usg_flex_700
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
