Page 3 of 280 results (0.012 seconds)

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 1

The improper privilege management vulnerability in the command “show_allsessions” in Zyxel NAS326 firmware versions before V5.21(AAZF.17)C0 and NAS542 firmware versions before V5.21(ABAG.14)C0 could allow an authenticated attacker to obtain a logged-in administrator’s session information containing cookies on an affected device. La vulnerabilidad de administración de privilegios inadecuada en el comando “show_allsessions” en las versiones de firmware Zyxel NAS326 anteriores a V5.21(AAZF.17)C0 y versiones de firmware NAS542 anteriores a V5.21(ABAG.14)C0 podría permitir una atacante autenticado para obtener información de la sesión de un administrador que ha iniciado sesión y que contiene cookies en un dispositivo afectado. • https://github.com/Pommaq/CVE-2024-29972-CVE-2024-29976-CVE-2024-29973-CVE-2024-29975-CVE-2024-29974-poc https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-nas-products-06-04-2024 • CWE-269: Improper Privilege Management •

CVSS: 6.7EPSS: 0%CPEs: 2EXPL: 1

The improper privilege management vulnerability in the SUID executable binary in Zyxel NAS326 firmware versions before V5.21(AAZF.17)C0 and NAS542 firmware versions before V5.21(ABAG.14)C0 could allow an authenticated local attacker with administrator privileges to execute some system commands as the “root” user on a vulnerable device. La vulnerabilidad de administración de privilegios inadecuada en el binario ejecutable SUID en las versiones de firmware Zyxel NAS326 anteriores a V5.21(AAZF.17)C0 y versiones de firmware NAS542 anteriores a V5.21(ABAG.14)C0 podría permitir una autenticación Atacante local con privilegios de administrador para ejecutar algunos comandos del sistema como usuario "root" en un dispositivo vulnerable. • https://github.com/Pommaq/CVE-2024-29972-CVE-2024-29976-CVE-2024-29973-CVE-2024-29975-CVE-2024-29974-poc https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-nas-products-06-04-2024 • CWE-269: Improper Privilege Management •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 1

The remote code execution vulnerability in the CGI program “file_upload-cgi” in Zyxel NAS326 firmware versions before V5.21(AAZF.17)C0 and NAS542 firmware versions before V5.21(ABAG.14)C0 could allow an unauthenticated attacker to execute arbitrary code by uploading a crafted configuration file to a vulnerable device. La vulnerabilidad de ejecución remota de código en el programa CGI “file_upload-cgi” en las versiones de firmware Zyxel NAS326 anteriores a V5.21(AAZF.17)C0 y versiones de firmware NAS542 anteriores a V5.21(ABAG.14)C0 podría permitir que un atacante no autenticado ejecute código arbitrario cargando un archivo de configuración manipulado en un dispositivo vulnerable. • https://github.com/Pommaq/CVE-2024-29972-CVE-2024-29976-CVE-2024-29973-CVE-2024-29975-CVE-2024-29974-poc https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-nas-products-06-04-2024 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 9.8EPSS: 92%CPEs: 2EXPL: 7

The command injection vulnerability in the “setCookie” parameter in Zyxel NAS326 firmware versions before V5.21(AAZF.17)C0 and NAS542 firmware versions before V5.21(ABAG.14)C0 could allow an unauthenticated attacker to execute some operating system (OS) commands by sending a crafted HTTP POST request. La vulnerabilidad de inyección de comando en el parámetro “setCookie” en las versiones de firmware Zyxel NAS326 anteriores a V5.21(AAZF.17)C0 y en las versiones de firmware NAS542 anteriores a V5.21(ABAG.14)C0 podría permitir una atacante ejecutar algunos comandos del sistema operativo (SO) enviando una solicitud HTTP POST manipulada. • https://github.com/RevoltSecurities/CVE-2024-29973 https://github.com/k3lpi3b4nsh33/CVE-2024-29973 https://github.com/bigb0x/CVE-2024-29973 https://github.com/momika233/CVE-2024-29973 https://github.com/Pommaq/CVE-2024-29972-CVE-2024-29976-CVE-2024-29973-CVE-2024-29975-CVE-2024-29974-poc https://github.com/p0et08/CVE-2024-29973 https://github.com/skyrowalker/CVE-2024-29973 https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities https://www.zyxel.com/global/en/support/secu • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.8EPSS: 92%CPEs: 2EXPL: 3

The command injection vulnerability in the CGI program "remote_help-cgi" in Zyxel NAS326 firmware versions before V5.21(AAZF.17)C0 and NAS542 firmware versions before V5.21(ABAG.14)C0 could allow an unauthenticated attacker to execute some operating system (OS) commands by sending a crafted HTTP POST request. La vulnerabilidad de inyección de comando en el programa CGI "remote_help-cgi" en las versiones de firmware Zyxel NAS326 anteriores a V5.21(AAZF.17)C0 y en las versiones de firmware NAS542 anteriores a V5.21(ABAG.14)C0 podría permitir que un atacante no autenticado ejecute algunos comandos del sistema operativo (SO) enviando una solicitud HTTP POST manipulada. • https://github.com/codeb0ss/CVE-2024-29972-PoC https://github.com/Pommaq/CVE-2024-29972-CVE-2024-29976-CVE-2024-29973-CVE-2024-29975-CVE-2024-29974-poc https://github.com/WanLiChangChengWanLiChang/CVE-2024-29972 https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-nas-products-06-04-2024 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •