A buffer overflow vulnerability in the Zyxel ATP series firmware versions 4.32 up to and including 5.36 Patch 2, USG FLEX series firmware versions 4.50 up to and including 5.36 Patch 2, USG FLEX 50(W) series firmware versions 4.16 up to and including 5.36 Patch 2, USG20(W)-VPN series firmware versions 4.16 up to and including 5.36 Patch 2, VPN series firmware versions 4.30 up to and including 5.36 Patch 2, NXC2500 firmware versions 6.10(AAIG.0) up to and including 6.10(AAIG.3), and NXC5500 firmware versions 6.10(AAOS.0) up to and including 6.10(AAOS.4), could allow an unauthenticated, LAN-based malicious user to cause denial of service (DoS) conditions by sending a crafted request to the CAPWAP daemon.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
zyxel usg_20w-vpn_firmware |
||
zyxel usg_2200-vpn_firmware |
||
zyxel usg_flex_100_firmware |
||
zyxel usg_flex_100w_firmware |
||
zyxel usg_flex_200_firmware |
||
zyxel usg_flex_50_firmware |
||
zyxel usg_flex_500_firmware |
||
zyxel usg_flex_50w_firmware |
||
zyxel usg_flex_700_firmware |
||
zyxel zywall_atp100_firmware |
||
zyxel zywall_atp100w_firmware |
||
zyxel zywall_atp200_firmware |
||
zyxel zywall_atp500_firmware |
||
zyxel zywall_atp700_firmware |
||
zyxel zywall_atp800_firmware |
||
zyxel zywall_vpn100_firmware |
||
zyxel zywall_vpn2s_firmware |
||
zyxel zywall_vpn300_firmware |
||
zyxel zywall_vpn50_firmware |
||
zyxel zywall_vpn_100_firmware |
||
zyxel zywall_vpn_300_firmware |
||
zyxel zywall_vpn_50_firmware |
||
zyxel nxc2500_firmware |
||
zyxel nxc5500_firmware |