#VU59129 OS Command Injection in ZyXEL Communications Corp. products - CVE-2021-35032

 

#VU59129 OS Command Injection in ZyXEL Communications Corp. products - CVE-2021-35032

Published: January 3, 2022


Vulnerability identifier: #VU59129
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2021-35032
CWE-ID: CWE-78
Exploitation vector: Local access
Exploit availability: No public exploit available
Vulnerable software:
GS1900-8HP
GS1900-10HP
GS1900-16
GS1900-24E
GS1900-24EP
GS1900-24
GS1900-24HP
GS1900-24HPv2
GS1900-48
GS1900-48HP
GS1900-48HPv2
Software vendor:
ZyXEL Communications Corp.

Description

The vulnerability allows a local user to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation in the libsal.so. A local user can pass specially crafted data to the application and execute arbitrary OS commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install updates from vendor's website.

External links