First published: Thu Nov 30 2023(Updated: )
A command injection vulnerability in the “show_zysync_server_contents” function of the Zyxel NAS326 firmware version V5.21(AAZF.14)C0 and NAS542 firmware version V5.21(ABAG.11)C0 could allow an unauthenticated attacker to execute some operating system (OS) commands by sending a crafted HTTP POST request.
Credit: security@zyxel.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Zyxel NAS326 firmware | <=5.21\(aazf.14\)c0 | |
Zyxel NAS326 | ||
All of | ||
Zyxel Nas542 Firmware | <=5.21\(abag.11\)c0 | |
Zyxel NAS542 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-35138 is a command injection vulnerability in the “show_zysync_server_contents” function of the Zyxel NAS326 and NAS542 firmware.
The severity of CVE-2023-35138 is critical, with a severity value of 9.8.
CVE-2023-35138 affects Zyxel NAS326 firmware version V5.21(AAZF.14)C0, allowing an unauthenticated attacker to execute operating system commands.
CVE-2023-35138 affects Zyxel NAS542 firmware version V5.21(ABAG.11)C0, allowing an unauthenticated attacker to execute operating system commands.
To fix CVE-2023-35138, update your Zyxel NAS326 and NAS542 firmware to a version that is not affected.