First published: Tue May 30 2023(Updated: )
The post-authentication command injection vulnerability in the Zyxel NAS326 firmware versions prior to V5.21(AAZF.13)C0 could allow an authenticated attacker with administrator privileges to execute some operating system (OS) commands on an affected device remotely.
Credit: security@zyxel.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Zyxel NAS326 firmware | <5.21\(aazf.13\)c0 | |
Zyxel NAS326 | ||
Zyxel Nas540 Firmware | <5.21\(aatb.10\)c0 | |
Zyxel Nas540 | ||
Zyxel Nas542 Firmware | <5.21\(abag.10\)c0 | |
Zyxel NAS542 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-27988 is a post-authentication command injection vulnerability in the Zyxel NAS326 firmware versions prior to V5.21(AAZF.13)C0.
An authenticated attacker with administrator privileges can execute operating system commands on an affected device remotely.
Update the Zyxel NAS326 firmware to version V5.21(AAZF.13)C0 or later.
No, Zyxel Nas326 firmware version 5.21(AAZF.13)C0 or later is not vulnerable to CVE-2023-27988.
You can find more information about CVE-2023-27988 in the Zyxel security advisory for the post-authentication command injection vulnerability in NAS products. The advisory is available at: https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-post-authentication-command-injection-vulnerability-in-nas-products