Risk | Low |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2022-26413 CVE-2022-26414 |
CWE-ID | CWE-78 CWE-119 |
Exploitation vector | Local network |
Public exploit | N/A |
Vulnerable software Subscribe |
VMG4927-B50A Hardware solutions / Routers for home users VMG3927-B50B Hardware solutions / Routers for home users EMG6726-B10A Hardware solutions / Routers for home users EMG5523-T50B Hardware solutions / Routers for home users EMG3525-T50B Hardware solutions / Routers for home users |
Vendor | ZyXEL Communications Corp. |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU62547
Risk: Low
CVSSv3.1: 7 [CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-26413
CWE-ID:
CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.
The vulnerability exists due to improper input validation in the CGI program. A remote user on the local network can pass specially crafted data to the application and execute arbitrary OS commands on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall update from vendor's website planning to be released in June and September 2022.
Vulnerable software versionsVMG4927-B50A: before V5.13(ABLY.7)C0
VMG3927-B50B: before V5.13(ABLY.7)C0
EMG6726-B10A: before V5.13(ABNP.7)C0
EMG5523-T50B: before V5.50(ABSL.0)B12
EMG3525-T50B: before V5.50(ABSL.0)B12
External linksQ & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU62548
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-26414
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in some internal functions. A local user can trigger memory corruption and cause a denial of service condition on the target system.
MitigationInstall update from vendor's website planning to be released in June and September 2022.
Vulnerable software versionsVMG4927-B50A: before V5.13(ABLY.7)C0
VMG3927-B50B: before V5.13(ABLY.7)C0
EMG6726-B10A: before V5.13(ABNP.7)C0
EMG5523-T50B: before V5.50(ABSL.0)B12
EMG3525-T50B: before V5.50(ABSL.0)B12
External linksQ & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.