First published: Thu May 02 2019(Updated: )
The ZyXEL P660HN-T1A v1 TCLinux Fw $7.3.15.0 v001 / 3.40(ULM.0)b31 router distributed by TrueOnline has a command injection vulnerability in the Remote System Log forwarding function, which is accessible by an unauthenticated user. The vulnerability is in the ViewLog.asp page and can be exploited through the remote_host parameter.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zyxel P660HN-T1A Routers | =7.3.8.0 | |
Billion 5200W-T | ||
Zyxel P660HN-T1A Routers | =7.3.15.0 | |
Zyxel P660HN-T1A Routers | ||
Zyxel P660hn-t1a V1 Firmware | =7.3.15.0 | |
ZyXEL P660HN-T1A v1 | ||
Zyxel P660HN-T1A Routers | ||
All of | ||
Billion 5200w-t Firmware | =7.3.8.0 | |
Billion 5200W-T | ||
All of | ||
Zyxel P660hn-t1a V2 Firmware | =7.3.15.0 | |
ZyXEL P660HN-T1A v2 | ||
All of | ||
Zyxel P660hn-t1a V1 Firmware | =7.3.15.0 | |
ZyXEL P660HN-T1A v1 |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-18368 is a command injection vulnerability found in the Zyxel P660HN-T1A routers.
An attacker can exploit CVE-2017-18368 by using the remote_host parameter of the ViewLog.asp page to inject and execute malicious commands on the router.
No, authentication is not required to exploit CVE-2017-18368.
The affected software for CVE-2017-18368 is the Zyxel P660HN-T1A routers.
Yes, Zyxel has released security advisories providing patches and firmware updates to address the command injection vulnerability in the P660HN-T1A routers.