vendor:
                    Zyxel USG/ZyWALL series, USG FLEX series, ATP series, VPN series, NSG series, NXC2500, NAP203, NWA50AX, WAC500, WAX510D
                by:
                    Marco Ivaldi
                6.1
                        CVSS
                    HIGH
                    Format String Vulnerability
                    134
                        CWE
                    Product Name: Zyxel USG/ZyWALL series, USG FLEX series, ATP series, VPN series, NSG series, NXC2500, NAP203, NWA50AX, WAC500, WAX510D
                    Affected Version From:  04.09
                    Affected Version To:  6.30(ABTF.2)
                    Patch Exists: YES
                    Related CWE: CVE-2022-26531
                    CPE:  h:zyxel:usg:4.71
                    Platforms Tested:  
                    2022
                    Zyxel Multiple CLI Commands Format String Vulnerability
The exploit targets multiple Zyxel products with firmware versions 4.09 through 4.71, 4.50 through 5.21, 4.32 through 5.21, 4.30 through 5.21, 1.00 through 1.33 Patch 4, and various earlier versions. These vulnerabilities could be exploited by a local authenticated attacker to trigger buffer overflow or system crash through a crafted payload. The exploit leverages format string bugs in the 'extension' argument of certain zysh commands to execute arbitrary code and escape the restricted shell environment.
Mitigation:
					Apply the patches provided by Zyxel to fix the format string vulnerabilities. Regularly update the firmware of Zyxel products to the latest versions to prevent exploitation.