First published: Tue Nov 12 2024(Updated: )
A post-authentication command injection vulnerability in the CGI program in the Zyxel GS1900-48 switch firmware version V2.80(AAHN.1)C0 and earlier could allow an authenticated, LAN-based attacker with administrator privileges to execute some operating system (OS) commands on an affected device by sending a crafted HTTP request.
Credit: security@zyxel.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Zyxel GS1900-8 firmware | <2.90\(aahh.0\)c0 | |
Zyxel GS1900-8 | ||
All of | ||
Zyxel GS1900-8HP firmware | <2.90\(aahi.0\)c0 | |
Zyxel GS1900-8HP firmware | ||
All of | ||
Zyxel GS1900-10HP firmware | <2.90\(aazi.0\)c0 | |
Zyxel GS1900-10HP firmware | ||
All of | ||
Zyxel GS1900-16 | <2.90\(aahj.0\)c0 | |
Zyxel GS1900-16 Firmware | ||
All of | ||
ZyXEL GS1900-24 firmware | <2.90\(aahl.0\)c0 | |
Zyxel GS1900-24E Firmware | ||
All of | ||
Zyxel GS1900-24E Firmware | <2.90\(aahk.0\)c0 | |
Zyxel GS1900-24E Firmware | ||
All of | ||
Zyxel GS1900-24EP Firmware | <2.90\(abto.0\)c0 | |
Zyxel GS1900-24EP Firmware | ||
All of | ||
Zyxel GS1900-24HPv2 | <2.90\(abtp.0\)c0 | |
Zyxel GS1900-48HPv2 | ||
All of | ||
Zyxel GS1900-48 Firmware | <2.90\(aahn.0\)c0 | |
Zyxel GS1900-48HP Firmware | ||
All of | ||
Zyxel GS1900-48HPv2 | <2.90\(abtq.0\)c0 | |
Zyxel GS1900-48HPv2 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8881 is classified as a high-severity vulnerability due to its potential impact on affected devices.
To mitigate CVE-2024-8881, upgrade the Zyxel GS1900-48 switch firmware to version 2.90(AAHN.0)C0 or later.
CVE-2024-8881 can be exploited by an authenticated LAN-based attacker with administrator privileges.
CVE-2024-8881 is a post-authentication command injection vulnerability affecting CyXEL GS1900 series switches.
The devices affected by CVE-2024-8881 include Zyxel GS1900-48 switches running firmware version V2.80(AAHN.1)C0 or earlier.