A post-authentication command injection vulnerability in the WSGI server of the Zyxel NAS326 firmware version V5.21(AAZF.14)C0 and NAS542 firmware version V5.21(ABAG.11)C0 could allow an authenticated attacker to execute some operating system (OS) commands by sending a crafted URL to a vulnerable device.
References
Configurations
History
06 Dec 2023, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
05 Dec 2023, 18:29
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:zyxel:nas542_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:nas326:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:nas326_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:nas542:-:*:*:*:*:*:*:* |
|
References | () https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-authentication-bypass-and-command-injection-vulnerabilities-in-nas-products - Patch, Vendor Advisory |
30 Nov 2023, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-30 02:15
Updated : 2024-02-05 00:22
NVD link : CVE-2023-37928
Mitre link : CVE-2023-37928
CVE.ORG link : CVE-2023-37928
JSON object : View
Products Affected
zyxel
- nas542
- nas326_firmware
- nas326
- nas542_firmware
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')