cve/2024/CVE-2024-29975.md

21 lines
1.3 KiB
Markdown
Raw Normal View History

2024-06-07 04:52:01 +00:00
### [CVE-2024-29975](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29975)
![](https://img.shields.io/static/v1?label=Product&message=NAS326%20firmware&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=NAS542%20firmware&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%20V5.21(AAZF.17)C0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%20V5.21(ABAG.14)C0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-269%20Improper%20Privilege%20Management&color=brighgreen)
### Description
** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED **The improper privilege management vulnerability in the SUID executable binary in Zyxel NAS326 firmware versions before V5.21(AAZF.17)C0 and NAS542 firmware versions before V5.21(ABAG.14)C0 could allow an authenticated local attacker with administrator privileges to execute some system commands as the “root” user on a vulnerable device.
### POC
#### Reference
- https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities/
#### Github
2025-09-29 16:08:36 +00:00
- https://github.com/Pommaq/CVE-2024-29972-CVE-2024-29976-CVE-2024-29973-CVE-2024-29975-CVE-2024-29974-poc
2024-07-25 21:25:12 +00:00
- https://github.com/nomi-sec/PoC-in-GitHub
2024-06-07 04:52:01 +00:00