We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-7261



AssignerZyxel
Reserved2024-07-30
Published2024-09-03
Updated2024-09-05

Description

The improper neutralization of special elements in the parameter "host" in the CGI program of Zyxel NWA1123ACv3 firmware version 6.70(ABVT.4) and earlier, WAC500 firmware version 6.70(ABVS.4) and earlier, WAX655E firmware version 7.00(ACDO.1) and earlier, WBE530 firmware version 7.00(ACLE.1) and earlier, and USG LITE 60AX firmware version V2.00(ACIP.2) could allow an unauthenticated attacker to execute OS commands by sending a crafted cookie to a vulnerable device.



CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Product status

Default status
0x400354beb0

<= 6.70(ABVT.4)
affected

Default status
0x400354bee0

<= 6.70(ABVS.4)
affected

Default status
0x400354bf10

<= 7.00(ACDO.1)
affected

Default status
0x400354bf40

<= 7.00(ACLE.1)
affected

Default status
0x400354bf70

V2.00(ACIP.2)
affected

References

https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-os-command-injection-vulnerability-in-aps-and-security-router-devices-09-03-2024 vendor-advisory

cve.org CVE-2024-7261

nvd.nist.gov CVE-2024-7261

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-7261
Subscribe to our newsletter to learn more about our work.