Lucene search

K
nvd[email protected]NVD:CVE-2023-37927
HistoryNov 30, 2023 - 2:15 a.m.

CVE-2023-37927

2023-11-3002:15:42
CWE-78
web.nvd.nist.gov
vulnerability
zyxel
nas326
nas542
firmware
cgi program
os commands
authenticated attacker
crafted url

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

20.5%

The improper neutralization of special elements in the CGI program of the Zyxel NAS326 firmware version V5.21(AAZF.14)C0 and NAS542 firmware version V5.21(ABAG.11)C0 could allow an authenticated attacker to execute some operating system (OS) commands by sending a crafted URL to a vulnerable device.

Affected configurations

NVD
Node
zyxelnas326_firmwareRange5.21\(aazf.14\)c0
AND
zyxelnas326Match-
Node
zyxelnas542_firmwareRange5.21\(abag.11\)c0
AND
zyxelnas542Match-

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

20.5%

Related for NVD:CVE-2023-37927