The configuration parser fails to sanitize user-controlled input in the Zyxel ATP series firmware versions 5.10 up to and including 5.36, USG FLEX series firmware versions 5.00 up to and including 5.36, USG FLEX 50(W) series firmware versions 5.10 up to and including 5.36, USG20(W)-VPN series firmware versions 5.10 up to and including 5.36, and VPN series firmware versions 5.00 up to and including 5.36. An unauthenticated, LAN-based attacker could leverage the vulnerability to inject some operating system (OS) commands into the device configuration data on an affected device when the cloud management mode is enabled.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
zyxel usg_2200-vpn_firmware |
||
zyxel usg_flex_100_firmware |
||
zyxel usg_flex_100w_firmware |
||
zyxel usg_flex_200_firmware |
||
zyxel usg_flex_50_firmware |
||
zyxel usg_flex_500_firmware |
||
zyxel usg_flex_50w_firmware |
||
zyxel usg_flex_700_firmware |
||
zyxel zywall_vpn100_firmware |
||
zyxel zywall_vpn2s_firmware |
||
zyxel zywall_vpn300_firmware |
||
zyxel zywall_vpn50_firmware |
||
zyxel zywall_vpn_100_firmware |
||
zyxel zywall_vpn_300_firmware |
||
zyxel zywall_vpn_50_firmware |
||
zyxel usg_20w-vpn_firmware |
||
zyxel zywall_atp100_firmware |
||
zyxel zywall_atp100w_firmware |
||
zyxel zywall_atp200_firmware |
||
zyxel zywall_atp500_firmware |
||
zyxel zywall_atp700_firmware |
||
zyxel zywall_atp800_firmware |