CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
17.7%
A buffer overflow vulnerability in the library “libclinkc” of the Zyxel VMG8825-T50K firmware version 5.50(ABOM.8)C0 could allow an unauthenticated attacker to cause denial of service (DoS) conditions by sending a crafted HTTP request to a vulnerable device.
Vendor | Product | Version | CPE |
---|---|---|---|
zyxel | nebula_lte3301-plus_firmware | * | cpe:2.3:o:zyxel:nebula_lte3301-plus_firmware:*:*:*:*:*:*:*:* |
zyxel | nebula_lte3301-plus | - | cpe:2.3:h:zyxel:nebula_lte3301-plus:-:*:*:*:*:*:*:* |
zyxel | nebula_fwa505_firmware | * | cpe:2.3:o:zyxel:nebula_fwa505_firmware:*:*:*:*:*:*:*:* |
zyxel | nebula_fwa505 | - | cpe:2.3:h:zyxel:nebula_fwa505:-:*:*:*:*:*:*:* |
zyxel | nebula_fwa710_firmware | * | cpe:2.3:o:zyxel:nebula_fwa710_firmware:*:*:*:*:*:*:*:* |
zyxel | nebula_fwa710 | - | cpe:2.3:h:zyxel:nebula_fwa710:-:*:*:*:*:*:*:* |
zyxel | nebula_fwa510_firmware | * | cpe:2.3:o:zyxel:nebula_fwa510_firmware:*:*:*:*:*:*:*:* |
zyxel | nebula_fwa510 | - | cpe:2.3:h:zyxel:nebula_fwa510:-:*:*:*:*:*:*:* |
zyxel | wx5600-t0_firmware | * | cpe:2.3:o:zyxel:wx5600-t0_firmware:*:*:*:*:*:*:*:* |
zyxel | wx5600-t0 | - | cpe:2.3:h:zyxel:wx5600-t0:-:*:*:*:*:*:*:* |
[
{
"defaultStatus": "unaffected",
"product": "VMG8825-T50K firmware",
"vendor": "Zyxel",
"versions": [
{
"status": "affected",
"version": "5.50(ABOM.8)C0"
}
]
}
]