7.2

CVE-2024-11253

A post-authentication command injection vulnerability in the "DNSServer” parameter of the diagnostic function in the Zyxel VMG8825-T50K firmware version V5.50(ABOM.8.5)C0 and earlier could allow an authenticated attacker with administrator privileges to execute operating system (OS) commands on a vulnerable device.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ZyxelEmg5723-t50k Firmware Version <= 5.50\(abom.8.5\)c0
   ZyxelEmg5723-t50k Version-
ZyxelDm4200-b0 Firmware Version <= 5.17\(acbs.1\)c0
   ZyxelDm4200-b0 Version-
ZyxelVmg3927-t50k Firmware Version <= 5.50\(abom.8.5\)c0
   ZyxelVmg3927-t50k Version-
ZyxelVmg4005-b50a Firmware Version <= 5.15\(abqa.2.3\)c0
   ZyxelVmg4005-b50a Version-
ZyxelVmg4005-b60a Firmware Version <= 5.15\(abqa.2.3\)c0
   ZyxelVmg4005-b60a Version-
ZyxelVmg8825-t50k Firmware Version <= 5.50\(abom.8.5\)c0
   ZyxelVmg8825-t50k Version-
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.34% 0.567
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
security@zyxel.com.tw 7.2 1.2 5.9
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.