CVE-2024-29973

** UNSUPPORTED WHEN ASSIGNED ** The command injection vulnerability in the “setCookie” parameter in Zyxel NAS326 firmware versions before V5.21(AAZF.17)C0 and NAS542 firmware versions before V5.21(ABAG.14)C0 could allow an unauthenticated attacker to execute some operating system (OS) commands by sending a crafted HTTP POST request.
Configurations

No configuration.

History

21 Nov 2024, 09:08

Type Values Removed Values Added
References () https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities/ - () https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities/ -
References () https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-nas-products-06-04-2024 - () https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-nas-products-06-04-2024 -

04 Jun 2024, 16:57

Type Values Removed Values Added
Summary
  • (es) ** NO SOPORTADO CUANDO S ASIGNÓ ** La vulnerabilidad de inyección de comando en el parámetro “setCookie” en las versiones de firmware Zyxel NAS326 anteriores a V5.21(AAZF.17)C0 y en las versiones de firmware NAS542 anteriores a V5.21(ABAG.14)C0 podría permitir una atacante ejecutar algunos comandos del sistema operativo (SO) enviando una solicitud HTTP POST manipulada.

04 Jun 2024, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-04 02:15

Updated : 2024-11-21 09:08


NVD link : CVE-2024-29973

Mitre link : CVE-2024-29973

CVE.ORG link : CVE-2024-29973


JSON object : View

Products Affected

No product.

CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')