8.8

CVE-2023-34139

A command injection vulnerability in the Free Time WiFi hotspot feature of the Zyxel USG FLEX series firmware versions 4.50 through 5.36 Patch 2 and VPN series firmware versions 4.20 through 5.36 Patch 2, could allow an unauthenticated, LAN-based attacker to execute some OS commands on an affected device.

Data is provided by the National Vulnerability Database (NVD)
ZyxelUsg 2200-vpn Firmware Version >= 4.20 < 5.37
   ZyxelUsg 2200-vpn Version-
ZyxelUsg Flex 100 Firmware Version >= 4.50 < 5.37
   ZyxelUsg Flex 100 Version-
ZyxelUsg Flex 100w Firmware Version >= 4.50 < 5.37
   ZyxelUsg Flex 100w Version-
ZyxelUsg Flex 200 Firmware Version >= 4.50 < 5.37
   ZyxelUsg Flex 200 Version-
ZyxelUsg Flex 50 Firmware Version >= 4.50 < 5.37
   ZyxelUsg Flex 50 Version-
ZyxelUsg Flex 500 Firmware Version >= 4.50 < 5.37
   ZyxelUsg Flex 500 Version-
ZyxelUsg Flex 50w Firmware Version >= 4.50 < 5.37
   ZyxelUsg Flex 50w Version-
ZyxelUsg Flex 700 Firmware Version >= 4.50 < 5.37
   ZyxelUsg Flex 700 Version-
ZyxelZywall Vpn100 Firmware Version >= 4.20 < 5.37
   ZyxelZywall Vpn100 Version-
ZyxelZywall Vpn2s Firmware Version >= 4.20 < 5.37
   ZyxelZywall Vpn2s Version-
ZyxelZywall Vpn300 Firmware Version >= 4.20 < 5.37
   ZyxelZywall Vpn300 Version-
ZyxelZywall Vpn50 Firmware Version >= 4.20 < 5.37
   ZyxelZywall Vpn50 Version-
ZyxelZywall Vpn 100 Firmware Version >= 4.20 < 5.37
   ZyxelZywall Vpn 100 Version-
ZyxelZywall Vpn 300 Firmware Version >= 4.20 < 5.37
   ZyxelZywall Vpn 300 Version-
ZyxelZywall Vpn 50 Firmware Version >= 4.20 < 5.37
   ZyxelZywall Vpn 50 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.22% 0.445
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
security@zyxel.com.tw 8.8 2.8 5.9
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.