vendor:
Zyxel USG/ZyWALL series, USG FLEX series, ATP series, VPN series, NSG series, NXC2500, NAP203, NWA50AX, WAC500, WAX510D
by:
Marco Ivaldi
6.1
CVSS
HIGH
Format String Vulnerability
134
CWE
Product Name: Zyxel USG/ZyWALL series, USG FLEX series, ATP series, VPN series, NSG series, NXC2500, NAP203, NWA50AX, WAC500, WAX510D
Affected Version From: 04.09
Affected Version To: 6.30(ABTF.2)
Patch Exists: YES
Related CWE: CVE-2022-26531
CPE: h:zyxel:usg:4.71
Platforms Tested:
2022
Zyxel Multiple CLI Commands Format String Vulnerability
The exploit targets multiple Zyxel products with firmware versions 4.09 through 4.71, 4.50 through 5.21, 4.32 through 5.21, 4.30 through 5.21, 1.00 through 1.33 Patch 4, and various earlier versions. These vulnerabilities could be exploited by a local authenticated attacker to trigger buffer overflow or system crash through a crafted payload. The exploit leverages format string bugs in the 'extension' argument of certain zysh commands to execute arbitrary code and escape the restricted shell environment.
Mitigation:
Apply the patches provided by Zyxel to fix the format string vulnerabilities. Regularly update the firmware of Zyxel products to the latest versions to prevent exploitation.