The improper neutralization of special elements in the WSGI server of the Zyxel NAS326 firmware version V5.21(AAZF.14)C0 and NAS542 firmware version V5.21(ABAG.11)C0 could allow an unauthenticated attacker to execute some operating system (OS) commands by sending a crafted URL to a vulnerable device.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 13 Feb 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:zyxel:nas326_firmware:5.21\(aazf.14\)c0:*:*:*:*:*:*:* cpe:2.3:o:zyxel:nas542_firmware:5.21\(abag.11\)c0:*:*:*:*:*:*:* |
|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Zyxel
Published:
Updated: 2025-02-13T17:13:42.559Z
Reserved: 2023-08-22T06:51:34.440Z
Link: CVE-2023-4474
Updated: 2024-08-02T07:31:05.490Z
Status : Modified
Published: 2023-11-30T02:15:43.553
Modified: 2024-11-21T08:35:14.640
Link: CVE-2023-4474
No data.
OpenCVE Enrichment
No data.
Weaknesses