Description
An eval injection vulnerability in the Python web server routing on the Zyxel NAS 326 version 5.21 and below allows a remote authenticated attacker to execute arbitrary code via the tjp6jp6y4, simZysh, and ck6fup6 APIs.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-2437 | An eval injection vulnerability in the Python web server routing on the Zyxel NAS 326 version 5.21 and below allows a remote authenticated attacker to execute arbitrary code via the tjp6jp6y4, simZysh, and ck6fup6 APIs. |
References
| Link | Providers |
|---|---|
| http://maxwelldulin.com/BlogPost?post=3236967424 |
|
History
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T22:32:01.264Z
Reserved: 2019-03-29T00:00:00.000Z
Link: CVE-2019-10633
No data.
Status : Modified
Published: 2019-04-09T05:29:00.387
Modified: 2024-11-21T04:19:38.027
Link: CVE-2019-10633
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD