First published: Thu Nov 30 2023(Updated: )
The improper neutralization of special elements in the CGI program of the Zyxel NAS326 firmware version V5.21(AAZF.14)C0 and NAS542 firmware version V5.21(ABAG.11)C0 could allow an authenticated attacker to execute some operating system (OS) commands by sending a crafted URL to a vulnerable device.
Credit: security@zyxel.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Zyxel NAS326 firmware | <=5.21\(aazf.14\)c0 | |
Zyxel NAS326 | ||
All of | ||
Zyxel Nas542 Firmware | <=5.21\(abag.11\)c0 | |
Zyxel NAS542 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-37927 refers to the improper neutralization of special elements in the CGI program of the Zyxel NAS326 firmware version V5.21(AAZF.14)C0 and NAS542 firmware version V5.21(ABAG.11)C0, which could allow an authenticated attacker to execute operating system commands by sending a crafted URL.
CVE-2023-37927 has a severity rating of 8.8 (high).
CVE-2023-37927 affects the Zyxel NAS326 firmware version V5.21(AAZF.14)C0, allowing an authenticated attacker to execute operating system commands through a crafted URL.
CVE-2023-37927 affects the Zyxel NAS542 firmware version V5.21(ABAG.11)C0, allowing an authenticated attacker to execute operating system commands through a crafted URL.
To fix CVE-2023-37927, it is recommended to update the Zyxel NAS326 firmware to a non-vulnerable version.