First published: Tue Apr 09 2019(Updated: )
An eval injection vulnerability in the Python web server routing on the Zyxel NAS 326 version 5.21 and below allows a remote authenticated attacker to execute arbitrary code via the tjp6jp6y4, simZysh, and ck6fup6 APIs.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zyxel NAS326 firmware | <=5.21 | |
Zyxel NAS326 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10633 is an eval injection vulnerability in the Zyxel NAS 326 version 5.21 and below.
CVE-2019-10633 allows a remote authenticated attacker to execute arbitrary code via specific APIs on the Zyxel NAS 326.
CVE-2019-10633 has a severity score of 8.8, which is considered high.
To fix CVE-2019-10633, update the Zyxel NAS 326 firmware to version 5.22 or higher.
You can find more information about CVE-2019-10633 at http://maxwelldulin.com/BlogPost?post=3236967424.