A command injection vulnerability was discovered on the Zyxel EMG2926 home router with firmware V1.00(AAQT.4)b8. The vulnerability is located in the diagnostic tools, specifically the nslookup function. A malicious user may exploit numerous vectors to execute arbitrary commands on the router, such as the ping_ip parameter to the expert/maintenance/diagnostic/nslookup URI.

Project Subscriptions

Vendors Products
Emg2926 Subscribe
Emg2926 Firmware Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 22 Oct 2025 00:30:00 +0000


Tue, 21 Oct 2025 20:30:00 +0000


Tue, 21 Oct 2025 19:30:00 +0000


Tue, 04 Feb 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'No', 'Exploitation': 'Active', 'Technical Impact': 'Total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'active', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 03 Feb 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2023-09-18'}

ssvc

{'options': {'Automatable': 'No', 'Exploitation': 'Active', 'Technical Impact': 'Total'}, 'version': '2.0.3'}


Thu, 23 Jan 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-10-21T23:55:42.908Z

Reserved: 2017-03-14T00:00:00.000Z

Link: CVE-2017-6884

cve-icon Vulnrichment

Updated: 2024-08-05T15:41:17.762Z

cve-icon NVD

Status : Deferred

Published: 2017-04-06T17:59:00.163

Modified: 2025-10-22T00:16:10.770

Link: CVE-2017-6884

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses