First published: Thu May 02 2019(Updated: )
The ZyXEL P660HN-T1A v2 TCLinux Fw #7.3.37.6 router distributed by TrueOnline has a command injection vulnerability in the Remote System Log forwarding function, which is only accessible by an authenticated user. The vulnerability is in the logSet.asp page and can be exploited through the ServerIP parameter. Authentication can be achieved by exploiting CVE-2017-18371.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zyxel P660HN-T1A Routers | =7.3.8.0 | |
Billion 5200W-T | ||
Zyxel P660HN-T1A Routers | =7.3.37.6 | |
Zyxel P660HN-T1A Routers | ||
Zyxel P660hn-t1a V1 Firmware | =7.3.37.6 | |
ZyXEL P660HN-T1A v1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-18370 is a command injection vulnerability in the ZyXEL P660HN-T1A v2 TCLinux Fw #7.3.37.6 router distributed by TrueOnline.
CVE-2017-18370 has a severity rating of 8.8, which is considered critical.
The Zyxel P660HN-T1A Routers with firmware versions 7.3.8.0 and 7.3.37.6 are affected by CVE-2017-18370.
The command injection vulnerability in CVE-2017-18370 can be exploited through the logSet.asp page in the Remote System Log forwarding function, which is only accessible by an authenticated user.
No, the Billion 5200W-T and ZyXEL P660HN-T1A v1 routers, as well as other firmware versions, are not vulnerable to CVE-2017-18370.