First published: Thu Nov 30 2023(Updated: )
A post-authentication command injection vulnerability in the WSGI server of the Zyxel NAS326 firmware version V5.21(AAZF.14)C0 and NAS542 firmware version V5.21(ABAG.11)C0 could allow an authenticated attacker to execute some operating system (OS) commands by sending a crafted URL to a vulnerable device.
Credit: security@zyxel.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Zyxel NAS326 firmware | <=5.21\(aazf.14\)c0 | |
Zyxel NAS326 | ||
All of | ||
Zyxel Nas542 Firmware | <=5.21\(abag.11\)c0 | |
Zyxel NAS542 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-37928 is a post-authentication command injection vulnerability in the WSGI server of the Zyxel NAS326 firmware version V5.21(AAZF.14)C0 and NAS542 firmware version V5.21(ABAG.11)C0.
CVE-2023-37928 allows an authenticated attacker to execute operating system commands by sending a crafted URL to a vulnerable device.
CVE-2023-37928 has a severity rating of 8.8 (high).
Yes, Zyxel NAS326 firmware version V5.21(AAZF.14)C0 is affected by CVE-2023-37928.
To fix the CVE-2023-37928 vulnerability, it is recommended to update the Zyxel NAS326 firmware to a version that is not vulnerable.