cve/2023/CVE-2023-37927.md

20 lines
1.2 KiB
Markdown
Raw Permalink Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-37927](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37927)
![](https://img.shields.io/static/v1?label=Product&message=NAS326%20firmware&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=NAS542%20firmware&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20V5.21(AAZF.14)C0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20V5.21(ABAG.11)C0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20('OS%20Command%20Injection')&color=brighgreen)
### Description
The improper neutralization of special elements in the CGI program of the Zyxel NAS326 firmware version V5.21(AAZF.14)C0 and NAS542 firmware version V5.21(ABAG.11)C0 could allow an authenticated attacker to execute some operating system (OS) commands by sending a crafted URL to a vulnerable device.
### POC
#### Reference
- https://bugprove.com/knowledge-hub/cve-2023-37927-and-cve-2023-37928-multiple-post-auth-blind-os-command-and-python-code-injection-vulnerabilities-in-zyxel-s-nas-326-devices/
#### Github
No PoCs found on GitHub currently.