Description
An eval injection vulnerability in the Python web server routing on the Zyxel NAS 326 version 5.21 and below allows a remote authenticated attacker to execute arbitrary code via the tjp6jp6y4, simZysh, and ck6fup6 APIs.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-2437 | An eval injection vulnerability in the Python web server routing on the Zyxel NAS 326 version 5.21 and below allows a remote authenticated attacker to execute arbitrary code via the tjp6jp6y4, simZysh, and ck6fup6 APIs. |
References
| Link | Providers |
|---|---|
| http://maxwelldulin.com/BlogPost?post=3236967424 |
|
History
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T22:32:01.264Z
Reserved: 2019-03-29T00:00:00.000Z
Link: CVE-2019-10633
No data.
Status : Modified
Published: 2019-04-09T05:29:00.387
Modified: 2024-11-21T04:19:38.027
Link: CVE-2019-10633
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD