First published: Tue Jun 04 2024(Updated: )
** UNSUPPORTED WHEN ASSIGNED ** The command injection vulnerability in the CGI program "remote_help-cgi" in Zyxel NAS326 firmware versions before V5.21(AAZF.17)C0 and NAS542 firmware versions before V5.21(ABAG.14)C0 could allow an unauthenticated attacker to execute some operating system (OS) commands by sending a crafted HTTP POST request.
Credit: security@zyxel.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Zyxel NAS326 | <V5.21(AAZF.17)C0 | |
Zyxel NAS542 firmware | <V5.21(ABAG.14)C0 | |
All of | ||
Zyxel NAS326 | <5.21\(aazf.17\)c0 | |
Zyxel NAS326 | ||
All of | ||
Zyxel NAS542 firmware | <5.21\(abag.14\)c0 | |
Zyxel NAS542 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-29972 is classified as a critical command injection vulnerability that could allow unauthenticated attackers to execute operating system commands.
To fix CVE-2024-29972, update the Zyxel NAS326 firmware to version V5.21(AAZF.17)C0 or the NAS542 firmware to version V5.21(ABAG.14)C0.
The affected products for CVE-2024-29972 are Zyxel NAS326 and NAS542 running firmware versions prior to V5.21(AAZF.17)C0 and V5.21(ABAG.14)C0 respectively.
Currently, there is no documented workaround for CVE-2024-29972 other than applying the necessary firmware updates.
CVE-2024-29972 potentially allows an unauthenticated attacker to execute arbitrary operating system commands on the vulnerable NAS devices.