CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
39.1%
SSVC
Exploitation
none
Automatable
yes
Technical Impact
total
UNSUPPORTED WHEN ASSIGNED
The remote code execution vulnerability in the CGI program “file_upload-cgi” in Zyxel NAS326 firmware versions before V5.21(AAZF.17)C0 and NAS542 firmware versions before V5.21(ABAG.14)C0 could allow an unauthenticated attacker to execute arbitrary code by uploading a crafted configuration file to a vulnerable device.
[
{
"cpes": [
"cpe:2.3:o:zyxel:nas326_firmware:-:*:*:*:*:*:*:*"
],
"vendor": "zyxel",
"product": "nas326_firmware",
"versions": [
{
"status": "affected",
"version": "0",
"lessThan": "v5.21\\(aazf.17\\)co",
"versionType": "custom"
}
],
"defaultStatus": "unknown"
},
{
"cpes": [
"cpe:2.3:o:zyxel:nas542_firmware:-:*:*:*:*:*:*:*"
],
"vendor": "zyxel",
"product": "nas542_firmware",
"versions": [
{
"status": "affected",
"version": "0",
"lessThan": "5.21\\(abag.14\\)co",
"versionType": "custom"
}
],
"defaultStatus": "unknown"
}
]
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
39.1%
SSVC
Exploitation
none
Automatable
yes
Technical Impact
total