CVE-2024-7261

Sept. 13, 2024, 7:39 p.m.

9.8
Critical

Description

The improper neutralization of special elements in the parameter "host" in the CGI program of Zyxel NWA1123ACv3 firmware version 6.70(ABVT.4) and earlier, WAC500 firmware version 6.70(ABVS.4) and earlier, WAX655E firmware version 7.00(ACDO.1) and earlier, WBE530 firmware version 7.00(ACLE.1) and earlier, and USG LITE 60AX firmware version V2.00(ACIP.2) could allow an unauthenticated attacker to execute OS commands by sending a crafted cookie to a vulnerable device.

Product(s) Impacted

Vendor Product Versions
Zyxel
  • Nwa110ax Firmware
  • Nwa110ax
  • Nwa1123-ac Pro Firmware
  • Nwa1123-ac Pro
  • Nwa1123acv3 Firmware
  • Nwa1123acv3
  • Nwa130be Firmware
  • Nwa130be
  • Nwa210ax Firmware
  • Nwa210ax
  • Nwa220ax-6e Firmware
  • Nwa220ax-6e
  • Nwa50ax Firmware
  • Nwa50ax
  • Nwa50ax Pro Firmware
  • Nwa50ax Pro
  • Nwa55axe Firmware
  • Nwa55axe
  • Nwa90ax Firmware
  • Nwa90ax
  • Nwa90ax Pro Firmware
  • Nwa90ax Pro
  • Usg Lite 60ax Firmware
  • Usg Lite 60ax
  • Wac500 Firmware
  • Wac500
  • Wac500h Firmware
  • Wac500h
  • Wac6103d-i Firmware
  • Wac6103d-i
  • Wac6502d-s Firmware
  • Wac6502d-s
  • Wac6503d-s Firmware
  • Wac6503d-s
  • Wac6552d-s Firmware
  • Wac6552d-s
  • Wac6553d-e Firmware
  • Wac6553d-e
  • Wax300h Firmware
  • Wax300h
  • Wax510d Firmware
  • Wax510d
  • Wax610d Firmware
  • Wax610d
  • Wax620d-6e Firmware
  • Wax620d-6e
  • Wax630s Firmware
  • Wax630s
  • Wax640s-6e Firmware
  • Wax640s-6e
  • Wax650s Firmware
  • Wax650s
  • Wax655e Firmware
  • Wax655e
  • Wbe530 Firmware
  • Wbe530
  • Wbe660s Firmware
  • Wbe660s
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -
  • *
  • -

Weaknesses

Common security weaknesses mapped to this vulnerability.

CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.

*CPE(s)

Affected systems and software identified for this CVE.

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
o zyxel nwa110ax_firmware / / / / / / / /
h zyxel nwa110ax - / / / / / / /
o zyxel nwa1123-ac_pro_firmware / / / / / / / /
h zyxel nwa1123-ac_pro - / / / / / / /
o zyxel nwa1123acv3_firmware / / / / / / / /
h zyxel nwa1123acv3 - / / / / / / /
o zyxel nwa130be_firmware / / / / / / / /
h zyxel nwa130be - / / / / / / /
o zyxel nwa210ax_firmware / / / / / / / /
h zyxel nwa210ax - / / / / / / /
o zyxel nwa220ax-6e_firmware / / / / / / / /
h zyxel nwa220ax-6e - / / / / / / /
o zyxel nwa50ax_firmware / / / / / / / /
h zyxel nwa50ax - / / / / / / /
o zyxel nwa50ax_pro_firmware / / / / / / / /
h zyxel nwa50ax_pro - / / / / / / /
o zyxel nwa55axe_firmware / / / / / / / /
h zyxel nwa55axe - / / / / / / /
o zyxel nwa90ax_firmware / / / / / / / /
h zyxel nwa90ax - / / / / / / /
o zyxel nwa90ax_pro_firmware / / / / / / / /
h zyxel nwa90ax_pro - / / / / / / /
o zyxel usg_lite_60ax_firmware / / / / / / / /
h zyxel usg_lite_60ax - / / / / / / /
o zyxel wac500_firmware / / / / / / / /
h zyxel wac500 - / / / / / / /
o zyxel wac500h_firmware / / / / / / / /
h zyxel wac500h - / / / / / / /
o zyxel wac6103d-i_firmware / / / / / / / /
h zyxel wac6103d-i - / / / / / / /
o zyxel wac6502d-s_firmware / / / / / / / /
h zyxel wac6502d-s - / / / / / / /
o zyxel wac6503d-s_firmware / / / / / / / /
h zyxel wac6503d-s - / / / / / / /
o zyxel wac6552d-s_firmware / / / / / / / /
h zyxel wac6552d-s - / / / / / / /
o zyxel wac6553d-e_firmware / / / / / / / /
h zyxel wac6553d-e - / / / / / / /
o zyxel wax300h_firmware / / / / / / / /
h zyxel wax300h - / / / / / / /
o zyxel wax510d_firmware / / / / / / / /
h zyxel wax510d - / / / / / / /
o zyxel wax610d_firmware / / / / / / / /
h zyxel wax610d - / / / / / / /
o zyxel wax620d-6e_firmware / / / / / / / /
h zyxel wax620d-6e - / / / / / / /
o zyxel wax630s_firmware / / / / / / / /
h zyxel wax630s - / / / / / / /
o zyxel wax640s-6e_firmware / / / / / / / /
h zyxel wax640s-6e - / / / / / / /
o zyxel wax650s_firmware / / / / / / / /
h zyxel wax650s - / / / / / / /
o zyxel wax655e_firmware / / / / / / / /
h zyxel wax655e - / / / / / / /
o zyxel wbe530_firmware / / / / / / / /
h zyxel wbe530 - / / / / / / /
o zyxel wbe660s_firmware / / / / / / / /
h zyxel wbe660s - / / / / / / /

CVSS Score

9.8 / 10

CVSS Data - 3.1

  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

    View Vector String

Timeline

Published: Sept. 3, 2024, 3:15 a.m.
Last Modified: Sept. 13, 2024, 7:39 p.m.

Status : Analyzed

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

security@zyxel.com.tw

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.