Логотип exploitDog
bind:CVE-2023-5372
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-5372

Количество 3

Количество 3

nvd логотип

CVE-2023-5372

около 2 лет назад

The post-authentication command injection vulnerability in Zyxel NAS326 firmware versions through V5.21(AAZF.15)C0 and NAS542 firmware versions through V5.21(ABAG.12)C0 could allow an authenticated attacker with administrator privileges to execute some operating system (OS) commands by sending a crafted query parameter attached to the URL of an affected device’s web management interface.

CVSS3: 7.2
EPSS: Средний
github логотип

GHSA-hgw6-wf28-c5x3

около 2 лет назад

The post-authentication command injection vulnerability in Zyxel NAS326 firmware versions through V5.21(AAZF.15)C0 and NAS542 firmware versions through V5.21(ABAG.12)C0 could allow an authenticated attacker with administrator privileges to execute some operating system (OS) commands by sending a crafted query parameter attached to the URL of an affected device’s web management interface.

CVSS3: 7.2
EPSS: Средний
fstec логотип

BDU:2024-00880

около 2 лет назад

Уязвимость веб-интерфейса управления микропрограммного обеспечения сетевых хранилищ Zyxel NAS326, NAS542, позволяющая нарушителю выполнять произвольные команды

CVSS3: 7.2
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-5372

The post-authentication command injection vulnerability in Zyxel NAS326 firmware versions through V5.21(AAZF.15)C0 and NAS542 firmware versions through V5.21(ABAG.12)C0 could allow an authenticated attacker with administrator privileges to execute some operating system (OS) commands by sending a crafted query parameter attached to the URL of an affected device’s web management interface.

CVSS3: 7.2
10%
Средний
около 2 лет назад
github логотип
GHSA-hgw6-wf28-c5x3

The post-authentication command injection vulnerability in Zyxel NAS326 firmware versions through V5.21(AAZF.15)C0 and NAS542 firmware versions through V5.21(ABAG.12)C0 could allow an authenticated attacker with administrator privileges to execute some operating system (OS) commands by sending a crafted query parameter attached to the URL of an affected device’s web management interface.

CVSS3: 7.2
10%
Средний
около 2 лет назад
fstec логотип
BDU:2024-00880

Уязвимость веб-интерфейса управления микропрограммного обеспечения сетевых хранилищ Zyxel NAS326, NAS542, позволяющая нарушителю выполнять произвольные команды

CVSS3: 7.2
10%
Средний
около 2 лет назад

Уязвимостей на страницу