9.8
CVSSv3

CVE-2024-29972

Published: 04/06/2024 Updated: 05/06/2024
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

** UNSUPPORTED WHEN ASSIGNED ** The command injection vulnerability in the CGI program "remote_help-cgi" in Zyxel NAS326 firmware versions before V5.21(AAZF.17)C0 and NAS542 firmware versions before V5.21(ABAG.14)C0 could allow an unauthenticated malicious user to execute some operating system (OS) commands by sending a crafted HTTP POST request.

Vulnerability Trend

Github Repositories

TG Join Us tme/WanLiChangChengWanLiChang 加入我们定时查收各类漏洞 EXP POC CVE-2024-29972-EXP CVE-2024-29972 Zyxel Nas Backdoor Account 后门账户未授权开启 FOFA app="ZyXEL-NAS326" 注意事项 该EXP利用脚本 系CVE-2024-29972与29973的结合利用 你也可以称为组合拳 后门账户 NsaRescueAngel 拥有Root 权限

Recent Articles

Zyxel issues emergency RCE patch for end-of-life NAS devices
BleepingComputer • Bill Toulas • 04 Jun 2024

Zyxel issues emergency RCE patch for end-of-life NAS devices By Bill Toulas June 4, 2024 01:28 PM 0 Zyxel Networks has released an emergency security update to address three critical vulnerabilities impacting older NAS devices that have reached end-of-life. The flaws impact NAS326 running firmware versions 5.21(AAZF.16)C0 and earlier, and NAS542 running firmware versions 5.21(ABAG.13)C0 and older. The networking solutions vendor addressed three critical flaws, which enable attackers to perform c...

Emergency patches released for critical vulns impacting EOL Zyxel NAS boxes
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources That backdoor's not meant to be there? JetBrains is still mad at Rapid7 for the ransomware attacks on its customers

Zyxel just released security fixes for two of its obsolete network-attached storage (NAS) devices after an intern at a security vendor reported critical flaws months ago. The NAS326 (running version V5.21(AAZF.16)C0 and earlier) and NAS542 (running versions V5.21(ABAG.13)C0 and earlier) models are affected. They both reached end-of-life (EOL) status on December 31, 2023, and are now vulnerable to several critical vulnerabilities that could lead to remote code execution (RCE) and other issues. Ti...