Risk | Low |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2022-26413 CVE-2022-26414 |
CWE-ID | CWE-78 CWE-119 |
Exploitation vector | Local network |
Public exploit | N/A |
Vulnerable software |
EMG5723-T50K Hardware solutions / Routers for home users VMG1312-T20B Hardware solutions / Routers for home users VMG3625-T50B Hardware solutions / Routers for home users VMG3927-B50A Hardware solutions / Routers for home users VMG3927-B60A Hardware solutions / Routers for home users VMG3927-T50K Hardware solutions / Routers for home users VMG8623-T50B Hardware solutions / Routers for home users VMG8825-B50A Hardware solutions / Routers for home users VMG8825-B50B Hardware solutions / Routers for home users VMG8825-T50K Hardware solutions / Routers for home users VMG8825-B60A Hardware solutions / Routers for home users VMG8825-B60B Hardware solutions / Routers for home users XMG3927-B50A Hardware solutions / Routers for home users XMG8825-B50A Hardware solutions / Routers for home users DX5401-B0 Hardware solutions / Routers for home users EX3510-B0 Hardware solutions / Routers for home users EX5401-B0 Hardware solutions / Routers for home users EP240P Hardware solutions / Routers for home users PM7300-T0 Hardware solutions / Routers for home users PMG5617-T20B2 Hardware solutions / Routers for home users PX7501-B0 Hardware solutions / Routers for home users EX5501-B0 Hardware solutions / Firmware AX7501-B0 Hardware solutions / Firmware PMG5317-T20B Hardware solutions / Firmware PMG5617GA Hardware solutions / Firmware PMG5622GA Hardware solutions / Firmware |
Vendor | ZyXEL Communications Corp. |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU62547
Risk: Low
CVSSv4.0: 6.1 [CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-26413
CWE-ID:
CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.
The vulnerability exists due to improper input validation in the CGI program. A remote user on the local network can pass specially crafted data to the application and execute arbitrary OS commands on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsEMG5723-T50K: before V5.50(ABOM.7)C0
VMG1312-T20B: before V5.30(ABSB.5)C0
VMG3625-T50B: before V5.50(ABPM.6)C0
VMG3927-B50A: before V5.17(ABMT.6)C0
VMG3927-B60A: before V5.17(ABMT.6)C0
VMG3927-T50K: before V5.50(ABOM.7)C0
VMG8623-T50B: before V5.50(ABPM.6)C0
VMG8825-B50A: before V5.17(ABMT.6)C0
VMG8825-B50B: before V5.17(ABNY.7)C0
VMG8825-T50K: before V5.50(ABOM.7)C0
VMG8825-B60A: before V5.17(ABMT.6)C0
VMG8825-B60B: before V5.17(ABNY.7)C0
XMG3927-B50A: before V5.17(ABMT.6)C0
XMG8825-B50A: before V5.17(ABMT.6)C0
DX5401-B0: before V5.17(ABYO.1)C0
EX3510-B0: before V5.17(ABUP.4)C1
EX5401-B0: before V5.17(ABYO.1)C0
EX5501-B0: before V5.17(ABRY.2)C0
AX7501-B0: before V5.17(ABPC.1)C0
EP240P: before V5.40(ABVH.0)C0
PM7300-T0: before V5.42(ACBC.1)C0
PMG5317-T20B: before V5.40(ABKI.4)C0
PMG5617GA: before V5.40(ABNA.2)C0
PMG5617-T20B2: before V5.41(ACBB.1)C0
PMG5622GA: before V5.40(ABNB.2)C0
PX7501-B0: before V5.17(ABPC.1)C0
CPE2.3Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU62548
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-26414
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in some internal functions. A local user can trigger memory corruption and cause a denial of service condition on the target system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsEMG5723-T50K: before V5.50(ABOM.7)C0
VMG1312-T20B: before V5.30(ABSB.5)C0
VMG3625-T50B: before V5.50(ABPM.6)C0
VMG3927-B50A: before V5.17(ABMT.6)C0
VMG3927-B60A: before V5.17(ABMT.6)C0
VMG3927-T50K: before V5.50(ABOM.7)C0
VMG8623-T50B: before V5.50(ABPM.6)C0
VMG8825-B50A: before V5.17(ABMT.6)C0
VMG8825-B50B: before V5.17(ABNY.7)C0
VMG8825-T50K: before V5.50(ABOM.7)C0
VMG8825-B60A: before V5.17(ABMT.6)C0
VMG8825-B60B: before V5.17(ABNY.7)C0
XMG3927-B50A: before V5.17(ABMT.6)C0
XMG8825-B50A: before V5.17(ABMT.6)C0
DX5401-B0: before V5.17(ABYO.1)C0
EX3510-B0: before V5.17(ABUP.4)C1
EX5401-B0: before V5.17(ABYO.1)C0
EX5501-B0: before V5.17(ABRY.2)C0
AX7501-B0: before V5.17(ABPC.1)C0
EP240P: before V5.40(ABVH.0)C0
PM7300-T0: before V5.42(ACBC.1)C0
PMG5317-T20B: before V5.40(ABKI.4)C0
PMG5617GA: before V5.40(ABNA.2)C0
PMG5617-T20B2: before V5.41(ACBB.1)C0
PMG5622GA: before V5.40(ABNB.2)C0
PX7501-B0: before V5.17(ABPC.1)C0
CPE2.3Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.