A post-authentication command injection vulnerability in the WSGI server of the Zyxel NAS326 firmware version V5.21(AAZF.14)C0 and NAS542 firmware version V5.21(ABAG.11)C0 could allow an authenticated attacker to execute some operating system (OS) commands by sending a crafted URL to a vulnerable device.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-41781 | A post-authentication command injection vulnerability in the WSGI server of the Zyxel NAS326 firmware version V5.21(AAZF.14)C0 and NAS542 firmware version V5.21(ABAG.11)C0 could allow an authenticated attacker to execute some operating system (OS) commands by sending a crafted URL to a vulnerable device. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Zyxel
Published:
Updated: 2025-02-13T17:01:40.648Z
Reserved: 2023-07-11T01:52:33.655Z
Link: CVE-2023-37928
No data.
Status : Modified
Published: 2023-11-30T02:15:43.137
Modified: 2024-11-21T08:12:29.503
Link: CVE-2023-37928
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD