CVE-2022-30525
Description
A OS command injection vulnerability in the CGI program of Zyxel USG FLEX 100(W) firmware versions 5.00 through 5.21 Patch 1, USG FLEX 200 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 500 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 700 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 50(W) firmware versions 5.10 through 5.21 Patch 1, USG20(W)-VPN firmware versions 5.10 through 5.21 Patch 1, ATP series firmware versions 5.10 through 5.21 Patch 1, VPN series firmware versions 4.60 through 5.21 Patch 1, which could allow an attacker to modify specific files and then execute some OS commands on a vulnerable device.
Affected products
8- Zyxel/USG FLEX 100(W) firmwarev5Range: 5.00 through 5.21 Patch 1
- Zyxel/USG FLEX 200 firmwarev5Range: 5.00 through 5.21 Patch 1
- Zyxel/USG FLEX 500 firmwarev5Range: 5.00 through 5.21 Patch 1
- Zyxel/USG FLEX 700 firmwarev5Range: 5.00 through 5.21 Patch 1
- Zyxel/ATP series firmwarev5Range: 5.10 through 5.21 Patch 1
- Zyxel/VPN series firmwarev5Range: 4.60 through 5.21 Patch 1
- Zyxel/USG FLEX 50(W) firmwarev5Range: 5.10 through 5.21 Patch 1
- Zyxel/USG 20(W)-VPN firmwarev5Range: 5.10 through 5.21 Patch 1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- packetstormsecurity.com/files/167176/Zyxel-Remote-Command-Execution.htmlmitrex_refsource_MISC
- packetstormsecurity.com/files/167182/Zyxel-Firewall-ZTP-Unauthenticated-Command-Injection.htmlmitrex_refsource_MISC
- packetstormsecurity.com/files/167372/Zyxel-USG-FLEX-5.21-Command-Injection.htmlmitrex_refsource_MISC
- packetstormsecurity.com/files/168202/Zyxel-Firewall-SUID-Binary-Privilege-Escalation.htmlmitrex_refsource_MISC
- www.zyxel.com/support/Zyxel-security-advisory-for-OS-command-injection-vulnerability-of-firewalls.shtmlmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.