CVE-2023-37928

Severity
8.8HIGH
EPSS
2.1%
top 15.77%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 30

Description

A post-authentication command injection vulnerability in the WSGI server of the Zyxel NAS326 firmware version V5.21(AAZF.14)C0 and NAS542 firmware version V5.21(ABAG.11)C0 could allow an authenticated attacker to execute some operating system (OS) commands by sending a crafted URL to a vulnerable device.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages4 packages

NVDzyxel/nas326_firmware5.21\(aazf.14\)c0
NVDzyxel/nas542_firmware5.21\(abag.11\)c0
CVEListV5zyxel/nas326_firmwareV5.21(AAZF.14)C0
CVEListV5zyxel/nas542_firmwareV5.21(ABAG.11)C0

Patches

🔴Vulnerability Details

2
GHSA
GHSA-2gqh-f22g-jh9g: A post-authentication command injection vulnerability in the WSGI server of the Zyxel NAS326 firmware version V52023-11-30
CVEList
CVE-2023-37928: A post-authentication command injection vulnerability in the WSGI server of the Zyxel NAS326 firmware version V52023-11-30
CVE-2023-37928 (HIGH CVSS 8.8) | A post-authentication command injec | cvebase.io