Zyxel warnt vor kritischer OS-Befehlsinjektionslücke in Routern

Teilen:

Zyxel has released security updates to address a critical vulnerability impacting multiple models of its business routers, potentially allowing unauthenticated attackers to perform OS command injection.

The flaw, tracked as CVE-2024-7261 and assigned a CVSS v3 score of 9.8 (“critical”), is an input validation fault caused by improper handling of user-supplied data, allowing remote attackers to execute arbitrary commands on the host operating system.

“The improper neutralization of special elements in the parameter “host” in the CGI program of some AP and security router versions could allow an unauthenticated attacker to execute OS commands by sending a crafted cookie to a vulnerable device,” – warns Zyxel.

The Zyxel access points (APs) impacted by CVE-2024-7261 are the following:

  • NWA Series: NWA50AX, NWA50AX PRO, NWA55AXE, NWA90AX, NWA90AX PRO, NWA110AX, NWA130BE, NWA210AX, NWA220AX-6E | all versions up to 7.00 are vulnerable, upgrade to 7.00(ABYW.2) and later
  • NWA1123-AC PRO | all versions up to 6.28 are vulnerable, upgrade to 6.28(ABHD.3) and later
  • NWA1123ACv3, WAC500, WAC500H | all versions up to 6.70 are vulnerable, upgrade to 6.70(ABVT.5)  and later
  • WAC Series: WAC6103D-I, WAC6502D-S, WAC6503D-S, WAC6552D-S, WAC6553D-E | all versions up to 6.28 are vulnerable, upgrade to 6.28(AAXH.3) and later
  • WAX Series: WAX300H, WAX510D, WAX610D, WAX620D-6E, WAX630S, WAX640S-6E, WAX650S, WAX655E | all versions up to 7.00 are vulnerable, upgrade to 7.00(ACHF.2) and later
  • WBE Series: WBE530, WBE660S | all versions up to 7.00 are vulnerable, upgrade to 7.00(ACLE.2) and later

Zyxel says that security router USG LITE 60AX running V2.00(ACIP.2) is also impacted, but this model is automatically updated by cloud to V2.00(ACIP.3), which implements the patch for CVE-2024-7261.

More Zyxel fixes

Zyxel has also issued security updates for multiple high-severity flaws in APT and USG FLEX firewalls. A summary can be found below:

  • CVE-2024-6343: Buffer overflow in the CGI program could lead to DoS by an authenticated admin sending a crafted HTTP request.
  • CVE-2024-7203: Post-authentication command injection allows an authenticated admin to execute OS commands via a crafted CLI command.
  • CVE-2024-42057: Command injection in IPSec VPN allows an unauthenticated attacker to execute OS commands with a crafted long username in User-Based-PSK mode.
  • CVE-2024-42058: Null pointer dereference could cause DoS via crafted packets sent by an unauthenticated attacker.
  • CVE-2024-42059: Post-authentication command injection allows an authenticated admin to execute OS commands by uploading a crafted compressed language file via FTP.
  • CVE-2024-42060: Post-authentication command injection allows an authenticated admin to execute OS commands by uploading a crafted internal user agreement file.
  • CVE-2024-42061: Reflected XSS in “dynamic_script.cgi” could allow an attacker to trick a user into visiting a crafted URL, potentially leaking browser-based information.

The most interesting of the above is CVE-2024-42057 (CVSS v3: 8.1, “high”), which is a command injection vulnerability in the IPSec VPN feature that can be remotely exploited without authentication.

Its severity is lessened by the specific configuration requirements required for exploitation, including configuring the device in User-Based-PSK authentication mode and having a user with a username that is over 28 characters long.

For more details on the impacted firewalls, check out Zyxel’s advisory here.

Bill Toulas

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
3:41 pm, Juni 23, 2025
Wetter-Symbol 22°C
L: 22° | H: 23°
aufgelockerte Bewölkung
Luftfeuchtigkeit: 39 %
Druck: 1014 mb
Wind: 14 mph W
Windböe: 25 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 39%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:43 am
Sonnenuntergang: 9:21 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
22° | 23°°C 0 mm 0% 14 mph 49 % 1015 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
13° | 23°°C 0.2 mm 20% 14 mph 80 % 1016 mb 0 mm/h
Mi. Juni 25 10:00 pm
Wetter-Symbol
16° | 28°°C 0 mm 0% 9 mph 89 % 1013 mb 0 mm/h
Do. Juni 26 10:00 pm
Wetter-Symbol
17° | 22°°C 1 mm 100% 14 mph 91 % 1017 mb 0 mm/h
Fr. Juni 27 10:00 pm
Wetter-Symbol
14° | 27°°C 0 mm 0% 16 mph 69 % 1020 mb 0 mm/h
Today 4:00 pm
Wetter-Symbol
22° | 22°°C 0 mm 0% 13 mph 40 % 1014 mb 0 mm/h
Today 7:00 pm
Wetter-Symbol
21° | 22°°C 0 mm 0% 14 mph 39 % 1014 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
17° | 19°°C 0 mm 0% 10 mph 49 % 1015 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
14° | 14°°C 0 mm 0% 9 mph 68 % 1016 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
13° | 13°°C 0 mm 0% 8 mph 80 % 1014 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
15° | 15°°C 0 mm 0% 11 mph 75 % 1014 mb 0 mm/h
Tomorrow 10:00 am
Wetter-Symbol
19° | 19°°C 0 mm 0% 12 mph 63 % 1013 mb 0 mm/h
Tomorrow 1:00 pm
Wetter-Symbol
20° | 20°°C 0 mm 0% 14 mph 66 % 1013 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€88,887.86
2.06%
Ethereum(ETH)
€1,993.26
4.71%
Fesseln(USDT)
€0.87
0.01%
XRP(XRP)
€1.76
4.27%
Solana(SOL)
€118.39
5.79%
USDC(USDC)
€0.87
0.01%
Dogecoin(DOGE)
€0.134926
5.27%
Shiba Inu(SHIB)
€0.000010
6.13%
Pepe(PEPE)
€0.000008
5.69%
Peanut das Eichhörnchen(PNUT)
€0.219411
13.10%
Nach oben scrollen