#VU57009 OS Command Injection in ZyWALL VPN2S - CVE-2021-35028

 

#VU57009 OS Command Injection in ZyWALL VPN2S - CVE-2021-35028

Published: October 4, 2021


Vulnerability identifier: #VU57009
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2021-35028
CWE-ID: CWE-78
Exploitation vector: Local access
Exploit availability: No public exploit available
Vulnerable software:
ZyWALL VPN2S
Software vendor:
ZyXEL Communications Corp.

Description

The vulnerability allows a local user to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation in the CGI program. A local user can pass specially crafted data to the application and execute arbitrary OS commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install updates from vendor's website.

External links