An eval injection vulnerability in the Python web server routing on the Zyxel NAS 326 version 5.21 and below allows a remote authenticated attacker to execute arbitrary code via the tjp6jp6y4, simZysh, and ck6fup6 APIs.
References
Link | Resource |
---|---|
http://maxwelldulin.com/BlogPost?post=3236967424 | Exploit Third Party Advisory |
http://maxwelldulin.com/BlogPost?post=3236967424 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:19
Type | Values Removed | Values Added |
---|---|---|
References | () http://maxwelldulin.com/BlogPost?post=3236967424 - Exploit, Third Party Advisory |
Information
Published : 2019-04-09 05:29
Updated : 2024-11-21 04:19
NVD link : CVE-2019-10633
Mitre link : CVE-2019-10633
CVE.ORG link : CVE-2019-10633
JSON object : View
Products Affected
zyxel
- nas326
- nas326_firmware
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')