CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
5.1%
Multiple improper input validation flaws were identified in some CLI commands of Zyxel USG/ZyWALL series firmware versions 4.09 through 4.71, USG FLEX series firmware versions 4.50 through 5.21, ATP series firmware versions 4.32 through 5.21, VPN series firmware versions 4.30 through 5.21, NSG series firmware versions 1.00 through 1.33 Patch 4, NXC2500 firmware version 6.10(AAIG.3) and earlier versions, NAP203 firmware version 6.25(ABFA.7) and earlier versions, NWA50AX firmware version 6.25(ABYW.5) and earlier versions, WAC500 firmware version 6.30(ABVS.2) and earlier versions, and WAX510D firmware version 6.30(ABTF.2) and earlier versions, that could allow a local authenticated attacker to cause a buffer overflow or a system crash via a crafted payload.
Vendor | Product | Version | CPE |
---|---|---|---|
zyxel | vpn100 | - | cpe:2.3:h:zyxel:vpn100:-:*:*:*:*:*:*:* |
zyxel | vpn100_firmware | * | cpe:2.3:o:zyxel:vpn100_firmware:*:*:*:*:*:*:*:* |
zyxel | vpn1000 | - | cpe:2.3:h:zyxel:vpn1000:-:*:*:*:*:*:*:* |
zyxel | vpn1000_firmware | * | cpe:2.3:o:zyxel:vpn1000_firmware:*:*:*:*:*:*:*:* |
zyxel | vpn300 | - | cpe:2.3:h:zyxel:vpn300:-:*:*:*:*:*:*:* |
zyxel | vpn300_firmware | * | cpe:2.3:o:zyxel:vpn300_firmware:*:*:*:*:*:*:*:* |
zyxel | vpn50 | - | cpe:2.3:h:zyxel:vpn50:-:*:*:*:*:*:*:* |
zyxel | vpn50_firmware | * | cpe:2.3:o:zyxel:vpn50_firmware:*:*:*:*:*:*:*:* |
zyxel | atp100 | - | cpe:2.3:h:zyxel:atp100:-:*:*:*:*:*:*:* |
zyxel | atp100_firmware | * | cpe:2.3:o:zyxel:atp100_firmware:*:*:*:*:*:*:*:* |
packetstormsecurity.com/files/167464/Zyxel-Buffer-Overflow-Format-String-Command-Injection.html
packetstormsecurity.com/files/177036/Zyxel-zysh-Format-String-Proof-Of-Concept.html
seclists.org/fulldisclosure/2022/Jun/15
www.zyxel.com/support/multiple-vulnerabilities-of-firewalls-AP-controllers-and-APs.shtml
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
5.1%