First published: Tue Feb 22 2022(Updated: )
A cross-site request forgery vulnerability in the HTTP daemon of the Zyxel ARMOR Z1/Z2 firmware could allow an attacker to execute arbitrary commands if they coerce or trick a local user to visit a compromised website with malicious scripts.
Credit: security@zyxel.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Zyxel Nbg6816 Firmware | =1.00\(aawb.10\)c0 | |
Zyxel Nbg6816 | ||
Zyxel Nbg6817 Firmware | <1.00\(abcs.11\)c0 | |
Zyxel Nbg6817 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-4030 has been assigned a medium severity rating due to its potential impact on user privacy and system integrity.
To mitigate CVE-2021-4030, it is recommended to update the Zyxel firmware to the latest version that addresses the vulnerability.
CVE-2021-4030 specifically affects Zyxel ARMOR Z1 and Z2 firmware versions 1.00(aawb.10)c0 and earlier for the NBG6816 and NBG6817 routers.
CVE-2021-4030 allows attackers to perform cross-site request forgery (CSRF) attacks, potentially executing arbitrary commands on the affected devices.
As of the latest reports, there have been no documented exploits specifically targeting CVE-2021-4030 in the wild.