cvelist/2024/7xxx/CVE-2024-7261.json

132 lines
5.4 KiB
JSON
Raw Normal View History

2024-07-30 03:00:37 +00:00
{
2024-09-03 03:00:35 +00:00
"data_version": "4.0",
2024-07-30 03:00:37 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-7261",
2024-09-03 03:00:35 +00:00
"ASSIGNER": "security@zyxel.com.tw",
"STATE": "PUBLIC"
2024-07-30 03:00:37 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-09-03 03:00:35 +00:00
"value": "The improper neutralization of special elements in the parameter \"host\" in the CGI program of Zyxel NWA1123ACv3 firmware version 6.70(ABVT.4) and earlier, WAC500 firmware version 6.70(ABVS.4) \n\nand earlier, WAX655E firmware version 7.00(ACDO.1) and earlier, WBE530 firmware version 7.00(ACLE.1) \n\nand earlier, and\u00a0USG LITE 60AX firmware version\u00a0V2.00(ACIP.2) could allow an unauthenticated attacker to execute OS commands by sending a crafted cookie to a vulnerable device."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')",
"cweId": "CWE-78"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Zyxel",
"product": {
"product_data": [
{
"product_name": "NWA1123ACv3 firmware",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "<= 6.70(ABVT.4)"
}
]
}
},
{
"product_name": "WAC500 firmware",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "<= 6.70(ABVS.4)"
}
]
}
},
{
"product_name": "WAX655E firmware",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "<= 7.00(ACDO.1)"
}
]
}
},
{
"product_name": "WBE530 firmware",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "<= 7.00(ACLE.1)"
}
]
}
},
{
"product_name": "USG LITE 60AX firmware",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "V2.00(ACIP.2)"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-os-command-injection-vulnerability-in-aps-and-security-router-devices-09-03-2024",
"refsource": "MISC",
"name": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-os-command-injection-vulnerability-in-aps-and-security-router-devices-09-03-2024"
}
]
},
"generator": {
"engine": "Vulnogram 0.2.0"
},
"source": {
"discovery": "UNKNOWN"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
2024-07-30 03:00:37 +00:00
}
]
}
}