8.8
CVSSv3

CVE-2023-28767

Published: 17/07/2023 Updated: 26/07/2023
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

The configuration parser fails to sanitize user-controlled input in the Zyxel ATP series firmware versions 5.10 up to and including 5.36, USG FLEX series firmware versions 5.00 up to and including 5.36,  USG FLEX 50(W) series firmware versions 5.10 up to and including 5.36, USG20(W)-VPN series firmware versions 5.10 up to and including 5.36, and VPN series firmware versions 5.00 up to and including 5.36. An unauthenticated, LAN-based attacker could leverage the vulnerability to inject some operating system (OS) commands into the device configuration data on an affected device when the cloud management mode is enabled.

Vulnerable Product Search on Vulmon Subscribe to Product

zyxel usg_2200-vpn_firmware

zyxel usg_flex_100_firmware

zyxel usg_flex_100w_firmware

zyxel usg_flex_200_firmware

zyxel usg_flex_50_firmware

zyxel usg_flex_500_firmware

zyxel usg_flex_50w_firmware

zyxel usg_flex_700_firmware

zyxel zywall_vpn100_firmware

zyxel zywall_vpn2s_firmware

zyxel zywall_vpn300_firmware

zyxel zywall_vpn50_firmware

zyxel zywall_vpn_100_firmware

zyxel zywall_vpn_300_firmware

zyxel zywall_vpn_50_firmware

zyxel usg_20w-vpn_firmware

zyxel zywall_atp100_firmware

zyxel zywall_atp100w_firmware

zyxel zywall_atp200_firmware

zyxel zywall_atp500_firmware

zyxel zywall_atp700_firmware

zyxel zywall_atp800_firmware