CVE-2024-29973

** UNSUPPORTED WHEN ASSIGNED ** The command injection vulnerability in the “setCookie” parameter in Zyxel NAS326 firmware versions before V5.21(AAZF.17)C0 and NAS542 firmware versions before V5.21(ABAG.14)C0 could allow an unauthenticated attacker to execute some operating system (OS) commands by sending a crafted HTTP POST request.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:zyxel:nas326_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:nas326:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:zyxel:nas542_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:nas542:-:*:*:*:*:*:*:*

History

22 Jan 2025, 22:40

Type Values Removed Values Added
References () https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities/ - () https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities/ - Exploit, Third Party Advisory
References () https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-nas-products-06-04-2024 - () https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-nas-products-06-04-2024 - Vendor Advisory
First Time Zyxel
Zyxel nas542 Firmware
Zyxel nas326
Zyxel nas326 Firmware
Zyxel nas542
CPE cpe:2.3:o:zyxel:nas326_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:nas326:-:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:nas542:-:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:nas542_firmware:*:*:*:*:*:*:*:*

21 Nov 2024, 09:08

Type Values Removed Values Added
References () https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities/ - () https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities/ -
References () https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-nas-products-06-04-2024 - () https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-nas-products-06-04-2024 -

04 Jun 2024, 16:57

Type Values Removed Values Added
Summary
  • (es) ** NO SOPORTADO CUANDO S ASIGNÓ ** La vulnerabilidad de inyección de comando en el parámetro “setCookie” en las versiones de firmware Zyxel NAS326 anteriores a V5.21(AAZF.17)C0 y en las versiones de firmware NAS542 anteriores a V5.21(ABAG.14)C0 podría permitir una atacante ejecutar algunos comandos del sistema operativo (SO) enviando una solicitud HTTP POST manipulada.

04 Jun 2024, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-04 02:15

Updated : 2025-01-22 22:40


NVD link : CVE-2024-29973

Mitre link : CVE-2024-29973

CVE.ORG link : CVE-2024-29973


JSON object : View

Products Affected

zyxel

  • nas542
  • nas542_firmware
  • nas326
  • nas326_firmware
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')