First published: Tue Feb 22 2022(Updated: )
A command injection vulnerability in the CGI program of the Zyxel ARMOR Z1/Z2 firmware could allow an attacker to execute arbitrary OS commands via a LAN interface.
Credit: security@zyxel.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Zyxel Nbg6816 Firmware | =1.00\(aawb.10\)c0 | |
Zyxel Nbg6816 | ||
Zyxel Nbg6817 Firmware | <1.00\(abcs.11\)c0 | |
Zyxel Nbg6817 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-4029 is classified as a high severity vulnerability due to the potential for executing arbitrary OS commands.
To mitigate CVE-2021-4029, update the firmware of your Zyxel ARMOR Z1/Z2 router to the latest version available from Zyxel.
CVE-2021-4029 affects the Zyxel ARMOR Z1 and Z2 routers, specifically the firmware version 1.00(aawb.10)c0 for NBG6816 and versions up to but not including 1.00(abcs.11)c0 for NBG6817.
Exploitation of CVE-2021-4029 could allow an attacker to gain unauthorized access and control over the affected Zyxel router.
You can determine if your Zyxel router is vulnerable to CVE-2021-4029 by checking the firmware version against the known vulnerable versions listed in the CVE details.