First published: Tue Nov 22 2011(Updated: )
The UPnP IGD implementation in the Pseudo ICS UPnP software on the ZyXEL P-330W allows remote attackers to establish arbitrary port mappings by sending a UPnP AddPortMapping action in a SOAP request to the WAN interface, related to an "external forwarding" vulnerability.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Genmei Mori Pseudoics | =0.1 | |
Genmei Mori Pseudoics | =0.2 | |
Genmei Mori Pseudoics | =0.3 | |
ZyXEL P-330W router |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2011-4504 is classified as high due to the potential for unauthorized remote access through arbitrary port mappings.
To fix CVE-2011-4504, ensure that your UPnP configuration is disabled on the ZyXEL P-330W router and consider updating to a later firmware version if available.
CVE-2011-4504 affects the Pseudo ICS UPnP software versions 0.1, 0.2, and 0.3, as well as the ZyXEL P-330W router.
CVE-2011-4504 is a remote command execution vulnerability that allows attackers to manipulate port mappings via UPnP.
Yes, CVE-2011-4504 can be exploited remotely, allowing attackers to send commands through the WAN interface.