cve/2023/CVE-2023-27992.md

24 lines
1.4 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-27992](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27992)
![](https://img.shields.io/static/v1?label=Product&message=NAS326%20firmware&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=NAS540%20firmware&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=NAS542%20firmware&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%20V5.21(AATB.11)C0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%20V5.21(AAZF.14)C0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%20V5.21(ABAG.11)C0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20('OS%20Command%20Injection')&color=brighgreen)
### Description
The pre-authentication command injection vulnerability in the Zyxel NAS326 firmware versions prior to V5.21(AAZF.14)C0, NAS540 firmware versions prior to V5.21(AATB.11)C0, and NAS542 firmware versions prior to V5.21(ABAG.11)C0 could allow an unauthenticated attacker to execute some operating system (OS) commands remotely by sending a crafted HTTP request.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/todb-cisa/kev-cwes