Zyxel Nas540 Firmware vulnerabilities
5 known vulnerabilities affecting zyxel/nas540_firmware.
Total CVEs
5
CISA KEV
2
actively exploited
Public exploits
1
Exploited in wild
2
Severity breakdown
CRITICAL2HIGH3
Vulnerabilities
Page 1 of 1
CVE-2023-27992CRITICALCVSS 9.8KEVfixed in 5.21\(aatb.11\)c0fixed in V5.21(AATB.11)C02023-06-19
CVE-2023-27992 [CRITICAL] CWE-78 CVE-2023-27992: The pre-authentication command injection vulnerability in the Zyxel NAS326 firmware versions prior t
The pre-authentication command injection vulnerability in the Zyxel NAS326 firmware versions prior to V5.21(AAZF.14)C0, NAS540 firmware versions prior to V5.21(AATB.11)C0, and NAS542 firmware versions prior to V5.21(ABAG.11)C0 could allow an unauthenticated attacker to execute some operating system (OS) commands remotely by sending a crafted HTTP r
cvelistv5nvd
CVE-2023-27988HIGHCVSS 7.2fixed in 5.21\(aatb.10\)c02023-05-30
CVE-2023-27988 [HIGH] CWE-78 CVE-2023-27988: The post-authentication command injection vulnerability in the Zyxel NAS326 firmware versions prior
The post-authentication command injection vulnerability in the Zyxel NAS326 firmware versions prior to V5.21(AAZF.13)C0 could allow an authenticated attacker with administrator privileges to execute some operating system (OS) commands on an affected device remotely.
nvd
CVE-2020-13364HIGHCVSS 8.8fixed in v5.21\(aatb.6\)c02020-08-06
CVE-2020-13364 [HIGH] CVE-2020-13364: A backdoor in certain Zyxel products allows remote TELNET access via a CGI script. This affects NAS5
A backdoor in certain Zyxel products allows remote TELNET access via a CGI script. This affects NAS520 V5.21(AASZ.4)C0, V5.21(AASZ.0)C0, V5.11(AASZ.3)C0, and V5.11(AASZ.0)C0; NAS542 V5.11(ABAG.0)C0, V5.20(ABAG.1)C0, and V5.21(ABAG.3)C0; NSA325 v2_V4.81(AALS.0)C0 and V4.81(AAAJ.1)C0; NSA310 4.22(AFK.0)C0 and 4.22(AFK.1)C0; NAS326 V5.21(AAZF.8)C0, V5.11(AAZF.4)
nvd
CVE-2020-13365HIGHCVSS 8.8fixed in v5.21\(aatb.6\)c02020-08-06
CVE-2020-13365 [HIGH] CWE-287 CVE-2020-13365: Certain Zyxel products have a locally accessible binary that allows a non-root user to generate a pa
Certain Zyxel products have a locally accessible binary that allows a non-root user to generate a password for an undocumented user account that can be used for a TELNET session as root. This affects NAS520 V5.21(AASZ.4)C0, V5.21(AASZ.0)C0, V5.11(AASZ.3)C0, and V5.11(AASZ.0)C0; NAS542 V5.11(ABAG.0)C0, V5.20(ABAG.1)C0, and V5.21(ABAG.3)C0; NSA325 v2_V4
nvd
CVE-2020-9054CRITICALCVSS 9.8KEVPoCfixed in 5.21\(aatb.4\)c02020-03-04
CVE-2020-9054 [CRITICAL] CWE-78 CVE-2020-9054: Multiple ZyXEL network-attached storage (NAS) devices running firmware version 5.21 contain a pre-au
Multiple ZyXEL network-attached storage (NAS) devices running firmware version 5.21 contain a pre-authentication command injection vulnerability, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable device. ZyXEL NAS devices achieve authentication by using the weblogin.cgi CGI executable. This program fails to
nvd