Impact
The Ziroom ZHOME A0101 router firmware 1.0.1.0 contains a flaw in the macAddrClone Lua script that accepts the macType parameter without any sanitization. The vulnerability permits an attacker to embed arbitrary shell commands into the system call that the script performs, resulting in Remote Command Execution with the privileges of the web server process. The weakness is classified as CWE‑74 (Improper Sanitization) and CWE‑77 (Command Injection).
Affected Systems
The only affected product listed is the Ziroom ZHOME A0101 router running firmware version 1.0.1.0. No other firmware revisions or device models are mentioned in the CNA data. The vendor has not released a patch or fix, and no official workaround has been provided.
Risk and Exploitability
The CVSS base score of 6.9 indicates a moderate severity vulnerability. The EPSS score of 2 % indicates that exploitation attempts are possible but unlikely, and the vulnerability is not yet in the CISA KEV catalogue. Public exploits have been published, and the description states that the attack can be launched remotely. It is unclear whether authentication is required; the text does not specify this, so the factor is unknown and inferred from the lack of detail. Because the vulnerability is remotely exploitable, the risk to affected systems is significant if the system is reachable from untrusted networks.
OpenCVE Enrichment