Enhancement: cves/2022/CVE-2022-30525.yaml by mp
parent
d836efe3c0
commit
4bb9fcf3bb
|
@ -1,16 +1,17 @@
|
|||
id: CVE-2022-30525
|
||||
|
||||
info:
|
||||
name: Zyxel Firewall - Unauthenticated RCE
|
||||
name: Zyxel Firewall - OS Command Injection
|
||||
author: h1ei1,prajiteshsingh
|
||||
severity: critical
|
||||
description: |
|
||||
The vulnerability affects Zyxel firewalls that support Zero Touch Provisioning (ZTP), including the ATP Series, VPN Series, and USG FLEX Series (including USG20-VPN and USG20W-VPN), allowing an unauthenticated remote attacker to target the affected device as nobody Execute arbitrary code as a user on.
|
||||
An OS command injection vulnerability in the CGI program of Zyxel USG FLEX 100(W) firmware versions 5.00 through 5.21 Patch 1, USG FLEX 200 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 500 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 700 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 50(W) firmware versions 5.10 through 5.21 Patch 1, USG20(W)-VPN firmware versions 5.10 through 5.21 Patch 1, ATP series firmware versions 5.10 through 5.21 Patch 1, VPN series firmware versions 4.60 through 5.21 Patch 1, are susceptible to a command injection vulnerability which could allow an attacker to modify specific files and then execute some OS commands on a vulnerable device.
|
||||
reference:
|
||||
- https://www.rapid7.com/blog/post/2022/05/12/cve-2022-30525-fixed-zyxel-firewall-unauthenticated-remote-command-injection/
|
||||
- https://github.com/rapid7/metasploit-framework/pull/16563
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2022-30525
|
||||
- https://www.zyxel.com/support/Zyxel-security-advisory-for-OS-command-injection-vulnerability-of-firewalls.shtml
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2022-30525
|
||||
metadata:
|
||||
shodan-query: title:"USG FLEX 100","USG FLEX 100w","USG FLEX 200","USG FLEX 500","USG FLEX 700","USG FLEX 50","USG FLEX 50w","ATP100","ATP200","ATP500","ATP700"
|
||||
classification:
|
||||
|
@ -36,3 +37,5 @@ requests:
|
|||
- type: status
|
||||
status:
|
||||
- 500
|
||||
|
||||
# Enhanced by mp on 2022/05/19
|
||||
|
|
Loading…
Reference in New Issue