First published: Tue Dec 28 2021(Updated: )
A vulnerability in the TFTP client of Zyxel GS1900 series firmware, XGS1210 series firmware, and XGS1250 series firmware, which could allow an authenticated LAN user to execute arbitrary OS commands via the GUI of the vulnerable device.
Credit: security@zyxel.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Zyxel GS1900-8 firmware | <2.70\(aahh.0\)-20211208 | |
Zyxel GS1900-8 | ||
Zyxel Gs1900-8hp Firmware | <2.70\(aahi.0\)-20211208 | |
Zyxel Gs1900-8hp | ||
Zyxel GS1900-10HP firmware | <2.70\(aazi.0\)-20211208 | |
Zyxel GS1900-10HP | ||
Zyxel Gs1900-16 Firmware | <2.70\(aahj.0\)-20211208 | |
Zyxel Gs1900-16 | ||
Zyxel Gs1900-24e Firmware | <2.70\(aahk.0\)-20211208 | |
Zyxel GS1900-24E | ||
Zyxel Gs1900-24ep Firmware | <2.70\(abto.0\)-20211208 | |
Zyxel GS1900-24EP | ||
Zyxel Gs1900-24 Firmware | <2.70\(aahl.0\)-20211208 | |
Zyxel GS1900-24 | ||
Zyxel Gs1900-24hp Firmware | <2.70\(aahm.0\)-20211208 | |
Zyxel Gs1900-24hp | ||
Zyxel Gs1900-24hpv2 Firmware | <2.70\(aatp.0\)-20211208 | |
Zyxel Gs1900-24hpv2 | ||
Zyxel Gs1900-48 Firmware | <2.70\(aahn.0\)-20211208 | |
Zyxel GS1900-48 | ||
Zyxel Gs1900-48hp Firmware | <2.70\(aaho.0\)-20211208 | |
Zyxel Gs1900-48hp | ||
Zyxel Gs1900-48hpv2 Firmware | <2.70\(abtq.0\)-20211208 | |
Zyxel Gs1900-48hpv2 | ||
Zyxel Xgs1210-12 Firmware | <1.00\(abty.5\)c0 | |
Zyxel Xgs1210-12 | ||
Zyxel Xgs1250-12 Firmware | <1.00\(abwe.1\)c0 | |
Zyxel Xgs1250-12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Zyxel firmware vulnerability is CVE-2021-35031.
This vulnerability in Zyxel firmware could allow an authenticated LAN user to execute arbitrary OS commands via the GUI of the vulnerable device.
Zyxel GS1900 series firmware versions 2.70(aahh.0)-20211208, XGS1210 series firmware version 1.00(abty.5)c0, and XGS1250 series firmware version 1.00(abwe.1)c0 are affected by this vulnerability.
This vulnerability has a severity level of high (8).
To fix this vulnerability, it is recommended to update the firmware to a version that is not affected by the vulnerability.