Lucene search

K
vulnrichmentZyxelVULNRICHMENT:CVE-2023-4474
HistoryNov 30, 2023 - 1:45 a.m.

CVE-2023-4474

2023-11-3001:45:29
CWE-78
Zyxel
github.com
2
cve-2023-4474
wsgi server
zyxel nas326
nas542
firmware
unauthenticated attacker
os commands
crafted url
security vulnerability

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.5

Confidence

Low

SSVC

Exploitation

PoC

Automatable

Yes

Technical Impact

Total

The improper neutralization of special elements in the WSGI server of the Zyxel NAS326 firmware version V5.21(AAZF.14)C0 and NAS542 firmware version V5.21(ABAG.11)C0 could allow an unauthenticated attacker to execute some operating system (OS) commands by sending a crafted URL to a vulnerable device.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:o:zyxel:nas326_firmware:5.21\\(aazf.14\\)c0:*:*:*:*:*:*:*"
    ],
    "vendor": "zyxel",
    "product": "nas326_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "5.21\\(aazf.14\\)c0"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:zyxel:nas542_firmware:5.21\\(abag.11\\)c0:*:*:*:*:*:*:*"
    ],
    "vendor": "zyxel",
    "product": "nas542_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "5.21\\(abag.11\\)c0"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.5

Confidence

Low

SSVC

Exploitation

PoC

Automatable

Yes

Technical Impact

Total

Related for VULNRICHMENT:CVE-2023-4474