9.8
CVSSv3

CVE-2024-29973

Published: 04/06/2024 Updated: 05/06/2024
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

** UNSUPPORTED WHEN ASSIGNED ** The command injection vulnerability in the “setCookie” parameter in Zyxel NAS326 firmware versions before V5.21(AAZF.17)C0 and NAS542 firmware versions before V5.21(ABAG.14)C0 could allow an unauthenticated malicious user to execute some operating system (OS) commands by sending a crafted HTTP POST request.

Vulnerability Trend

Github Repositories

POC for CVE-2024-29973

CVE-2024-29973 PoC and Bulk Scanner Overview This repository contains a proof-of-concept (PoC) and bulk scanner for CVE-2024-29973: Command injection vulnerability in Zyxel NAS326 firmware versions before V521(AAZF17)C0 and NAS542 firmware versions before V521(ABAG14) How to Use Single Target Scan To scan a single target IP: python cve-2024-29973py -ip IP

Recent Articles

Zyxel issues emergency RCE patch for end-of-life NAS devices
BleepingComputer • Bill Toulas • 04 Jun 2024

Zyxel issues emergency RCE patch for end-of-life NAS devices By Bill Toulas June 4, 2024 01:28 PM 0 Zyxel Networks has released an emergency security update to address three critical vulnerabilities impacting older NAS devices that have reached end-of-life. The flaws impact NAS326 running firmware versions 5.21(AAZF.16)C0 and earlier, and NAS542 running firmware versions 5.21(ABAG.13)C0 and older. The networking solutions vendor addressed three critical flaws, which enable attackers to perform c...

Emergency patches released for critical vulns impacting EOL Zyxel NAS boxes
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources That backdoor's not meant to be there? JetBrains is still mad at Rapid7 for the ransomware attacks on its customers

Zyxel just released security fixes for two of its obsolete network-attached storage (NAS) devices after an intern at a security vendor reported critical flaws months ago. The NAS326 (running version V5.21(AAZF.16)C0 and earlier) and NAS542 (running versions V5.21(ABAG.13)C0 and earlier) models are affected. They both reached end-of-life (EOL) status on December 31, 2023, and are now vulnerable to several critical vulnerabilities that could lead to remote code execution (RCE) and other issues. Ti...