Description
The post-authentication command injection vulnerability in Zyxel NAS326 firmware versions through V5.21(AAZF.15)C0 and NAS542 firmware versions through V5.21(ABAG.12)C0 could allow an authenticated attacker with administrator privileges to execute some operating system (OS) commands by sending a crafted query parameter attached to the URL of an affected device’s web management interface.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
No history.
Status: PUBLISHED
Assigner: Zyxel
Published:
Updated: 2024-08-23T18:58:04.490Z
Reserved: 2023-10-04T03:32:04.281Z
Link: CVE-2023-5372
Updated: 2024-08-02T07:59:44.902Z
Status : Modified
Published: 2024-01-30T01:15:59.063
Modified: 2024-11-21T08:41:38.017
Link: CVE-2023-5372
No data.
OpenCVE Enrichment
No data.
Weaknesses