First published: Tue Sep 10 2024(Updated: )
**UNSUPPORTED WHEN ASSIGNED** A command injection vulnerability in the export-cgi program of Zyxel NAS326 firmware versions through V5.21(AAZF.18)C0 and NAS542 firmware versions through V5.21(ABAG.15)C0 could allow an unauthenticated attacker to execute some operating system (OS) commands by sending a crafted HTTP POST request.
Credit: security@zyxel.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Zyxel NAS326 | <=V5.21(AAZF.18)C0 | |
Zyxel NAS542 firmware | <=V5.21(ABAG.15)C0 | |
All of | ||
Any of | ||
Zyxel NAS326 | <5.21\(aazf.18\)c0 | |
Zyxel NAS326 | =5.21\(aazf.18\)c0 | |
Zyxel NAS326 | ||
All of | ||
Any of | ||
Zyxel NAS542 firmware | <5.21\(abag.15\)c0 | |
Zyxel NAS542 firmware | =5.21\(abag.15\)c0 | |
Zyxel NAS542 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6342 is classified as a command injection vulnerability, which is considered a critical severity due to its potential to allow unauthenticated attackers to execute OS commands.
To mitigate CVE-2024-6342, users should update the firmware of their Zyxel NAS326 or NAS542 devices to the latest version provided by Zyxel.
CVE-2024-6342 affects Zyxel NAS326 firmware versions up to V5.21(AAZF.18)C0 and Zyxel NAS542 firmware versions up to V5.21(ABAG.15)C0.
Yes, CVE-2024-6342 can be exploited by unauthenticated attackers remotely, making it a serious threat.
CVE-2024-6342 impacts the Zyxel NAS326 and NAS542 network-attached storage devices.