### [CVE-2019-10633](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10633) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description An eval injection vulnerability in the Python web server routing on the Zyxel NAS 326 version 5.21 and below allows a remote authenticated attacker to execute arbitrary code via the tjp6jp6y4, simZysh, and ck6fup6 APIs. ### POC #### Reference - http://maxwelldulin.com/BlogPost?post=3236967424 #### Github No PoCs found on GitHub currently.