We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-7261



Description

The improper neutralization of special elements in the parameter "host" in the CGI program of Zyxel NWA1123ACv3 firmware version 6.70(ABVT.4) and earlier, WAC500 firmware version 6.70(ABVS.4) and earlier, WAX655E firmware version 7.00(ACDO.1) and earlier, WBE530 firmware version 7.00(ACLE.1) and earlier, and USG LITE 60AX firmware version V2.00(ACIP.2) could allow an unauthenticated attacker to execute OS commands by sending a crafted cookie to a vulnerable device.

Reserved 2024-07-30 | Published 2024-09-03 | Updated 2024-09-05 | Assigner Zyxel


CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Product status

Default status
unaffected

<= 6.70(ABVT.4)
affected

Default status
unaffected

<= 6.70(ABVS.4)
affected

Default status
unaffected

<= 7.00(ACDO.1)
affected

Default status
unaffected

<= 7.00(ACLE.1)
affected

Default status
unaffected

V2.00(ACIP.2)
affected

References

www.zyxel.com/...-aps-and-security-router-devices-09-03-2024 vendor-advisory

cve.org (CVE-2024-7261)

nvd.nist.gov (CVE-2024-7261)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-7261

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.