mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 10:41:43 +00:00
20 lines
1.2 KiB
Markdown
20 lines
1.2 KiB
Markdown
![]() |
### [CVE-2023-37928](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37928)
|
||
|

|
||
|

|
||
|
C0%20&color=brighgreen)
|
||
|
C0%20&color=brighgreen)
|
||
|
&color=brighgreen)
|
||
|
|
||
|
### Description
|
||
|
|
||
|
A post-authentication command injection vulnerability in the WSGI server of the Zyxel NAS326 firmware version V5.21(AAZF.14)C0 and NAS542 firmware version V5.21(ABAG.11)C0 could allow an authenticated attacker to execute some operating system (OS) commands by sending a crafted URL to a vulnerable device.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://bugprove.com/knowledge-hub/cve-2023-37927-and-cve-2023-37928-multiple-post-auth-blind-os-command-and-python-code-injection-vulnerabilities-in-zyxel-s-nas-326-devices/
|
||
|
|
||
|
#### Github
|
||
|
No PoCs found on GitHub currently.
|
||
|
|