A buffer overflow vulnerability in the notification function in Zyxel ATP series firmware versions 4.60 through 5.36 Patch 1, USG FLEX series firmware versions 4.60 through 5.36 Patch 1, USG FLEX 50(W) firmware versions 4.60 through 5.36 Patch 1, USG20(W)-VPN firmware versions 4.60 through 5.36 Patch 1, VPN series firmware versions 4.60 through 5.36 Patch 1, ZyWALL/USG series firmware versions 4.60 through 4.73 Patch 1, could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and even a remote code execution on an affected device.

Project Subscriptions

Vendors Products
Atp100 Firmware Subscribe
Atp100w Subscribe
Atp100w Firmware Subscribe
Atp200 Firmware Subscribe
Atp500 Firmware Subscribe
Atp700 Firmware Subscribe
Atp800 Firmware Subscribe
Usg20-vpn Subscribe
Usg20-vpn Firmware Subscribe
Usg 20w-vpn Subscribe
Usg 20w-vpn Firmware Subscribe
Usg 40 Firmware Subscribe
Usg 40w Subscribe
Usg 40w Firmware Subscribe
Usg 60 Firmware Subscribe
Usg 60w Subscribe
Usg 60w Firmware Subscribe
Usg Flex 100 Subscribe
Usg Flex 100 Firmware Subscribe
Usg Flex 100w Subscribe
Usg Flex 100w Firmware Subscribe
Usg Flex 200 Subscribe
Usg Flex 200 Firmware Subscribe
Usg Flex 50 Subscribe
Usg Flex 500 Subscribe
Usg Flex 500 Firmware Subscribe
Usg Flex 50 Firmware Subscribe
Usg Flex 50w Subscribe
Usg Flex 50w Firmware Subscribe
Usg Flex 700 Subscribe
Usg Flex 700 Firmware Subscribe
Vpn1000 Subscribe
Vpn1000 Firmware Subscribe
Vpn100 Firmware Subscribe
Vpn300 Firmware Subscribe
Vpn50 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2023-37198 A buffer overflow vulnerability in the notification function in Zyxel ATP series firmware versions 4.60 through 5.36 Patch 1, USG FLEX series firmware versions 4.60 through 5.36 Patch 1, USG FLEX 50(W) firmware versions 4.60 through 5.36 Patch 1, USG20(W)-VPN firmware versions 4.60 through 5.36 Patch 1, VPN series firmware versions 4.60 through 5.36 Patch 1, ZyWALL/USG series firmware versions 4.60 through 4.73 Patch 1, could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and even a remote code execution on an affected device.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 21 Oct 2025 23:30:00 +0000


Tue, 21 Oct 2025 20:30:00 +0000


Tue, 21 Oct 2025 19:30:00 +0000


Tue, 04 Feb 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2023-06-05'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Zyxel

Published:

Updated: 2025-10-21T23:05:47.636Z

Reserved: 2023-05-17T00:00:00.000Z

Link: CVE-2023-33009

cve-icon Vulnrichment

Updated: 2024-08-02T15:32:46.565Z

cve-icon NVD

Status : Analyzed

Published: 2023-05-24T13:15:09.560

Modified: 2025-10-27T17:04:58.650

Link: CVE-2023-33009

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses