vendor:
USG FLEX 5.21
by:
Valentin Lobstein
8.8
CVSS
HIGH
OS Command Injection
78
CWE
Product Name: USG FLEX 5.21
Affected Version From: ZLD5.00
Affected Version To: ZLD5.21
Patch Exists: YES
Related CWE: CVE-2022-30525
CPE: h:zyxel:usg_flex_5.21
Tags: packetstorm,zyxel,cve,cve2022,firewall,unauth,kev,msf,rce
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Nuclei References:
https://www.rapid7.com/blog/post/2022/05/12/cve-2022-30525-fixed-zyxel-firewall-unauthenticated-remote-command-injection/, https://github.com/rapid7/metasploit-framework/pull/16563, https://www.zyxel.com/support/Zyxel-security-advisory-for-OS-command-injection-vulnerability-of-firewalls.shtml, https://nvd.nist.gov/vuln/detail/CVE-2022-30525, http://packetstormsecurity.com/files/167176/Zyxel-Remote-Command-Execution.html
Nuclei Metadata: {'max-request': 1, 'shodan-query': 'title:"USG FLEX 100","USG FLEX 100w","USG FLEX 200","USG FLEX 500","USG FLEX 700","USG FLEX 50","USG FLEX 50w","ATP100","ATP200","ATP500","ATP700"', 'vendor': 'zyxel', 'product': 'usg_flex_100w_firmware'}
Platforms Tested: Linux
2022
Zyxel USG FLEX 5.21 – OS Command Injection
An OS command injection vulnerability exists in Zyxel USG FLEX 5.21. An attacker can send a specially crafted HTTP request to the vulnerable server to execute arbitrary OS commands. This vulnerability affects ZLD5.00 thru ZLD5.21.
Mitigation:
Upgrade to the latest version of Zyxel USG FLEX 5.21.