First published: Thu Nov 30 2023(Updated: )
The improper neutralization of special elements in the WSGI server of the Zyxel NAS326 firmware version V5.21(AAZF.14)C0 and NAS542 firmware version V5.21(ABAG.11)C0 could allow an unauthenticated attacker to execute some operating system (OS) commands by sending a crafted URL to a vulnerable device.
Credit: security@zyxel.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Zyxel NAS326 firmware | <=5.21\(aazf.14\)c0 | |
Zyxel NAS326 | ||
All of | ||
Zyxel NAS542 firmware | <=5.21\(abag.11\)c0 | |
Zyxel NAS542 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-4474 is a vulnerability that allows an unauthenticated attacker to execute operating system commands on a Zyxel NAS326 or NAS542 device.
CVE-2023-4474 has a severity rating of 9.8, which is considered critical.
The Zyxel NAS326 firmware version V5.21(AAZF.14)C0 and NAS542 firmware version V5.21(ABAG.11)C0 are affected.
An attacker can exploit CVE-2023-4474 by sending a crafted URL to a vulnerable Zyxel NAS326 or NAS542 device.
No, CVE-2023-4474 allows an unauthenticated attacker to execute operating system commands.