First published: Tue Nov 27 2018(Updated: )
A system command injection vulnerability in zyshclient in ZyXEL NSA325 V2 version 4.81 allows attackers to execute system commands via the web application API.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zyxel NSA325 V2 Firmware | =4.81 | |
Zyxel NSA325 V2 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-14893 has a high severity rating due to its potential for remote system command execution.
To fix CVE-2018-14893, update the ZyXEL NSA325 V2 firmware to a version beyond 4.81.
CVE-2018-14893 can be exploited by attackers to execute arbitrary system commands through the web application API.
CVE-2018-14893 affects the ZyXEL NSA325 V2 running firmware version 4.81.
CVE-2018-14893 is a remote vulnerability that can be exploited over the network.