4.9

CVE-2024-9197

A post-authentication buffer overflow vulnerability in the parameter "action" of the CGI program in Zyxel VMG3625-T50B firmware versions through V5.50(ABPM.9.2)C0 could allow an authenticated attacker with administrator privileges to cause a temporary denial of service (DoS) condition against the web management interface by sending a crafted HTTP GET request to a vulnerable device if the function ZyEE is enabled.

Data is provided by the National Vulnerability Database (NVD)
ZyxelDx3300-t0 Firmware Version < 5.50\(aby.5.4\)c0
   ZyxelDx3300-t0 Version-
ZyxelDx3300-t1 Firmware Version < 5.50\(aby.5.4\)c0
   ZyxelDx3300-t1 Version-
ZyxelDx3301-t0 Firmware Version < 5.50\(aby.5.4\)c0
   ZyxelDx3301-t0 Version-
ZyxelDx4510-b0 Firmware Version < 5.17\(abyl.8\)c0
   ZyxelDx4510-b0 Version-
ZyxelDx4510-b1 Firmware Version < 5.17\(abyl.8\)c0
   ZyxelDx4510-b1 Version-
ZyxelDx5401-b0 Firmware Version < 5.17\(abyo.6.4\)c0
   ZyxelDx5401-b0 Version-
ZyxelDx5401-b1 Firmware Version < 5.17\(abyo.6.4\)c0
   ZyxelDx5401-b1 Version-
ZyxelEe6510-10 Firmware Version < 5.19\(acjq.1\)c0
   ZyxelEe6510-10 Version-
ZyxelEx3300-t0 Firmware Version < 5.50\(aby.5.4\)c0
   ZyxelEx3300-t0 Version-
ZyxelEx3300-t1 Firmware Version < 5.50\(aby.5.4\)c0
   ZyxelEx3300-t1 Version-
ZyxelEx3301-t0 Firmware Version < 5.50\(aby.5.4\)c0
   ZyxelEx3301-t0 Version-
ZyxelEx3500-t0 Firmware Version < 5.44\(achr.3\)c0
   ZyxelEx3500-t0 Version-
ZyxelEx3501-t0 Firmware Version < 5.44\(achr.3\)c0
   ZyxelEx3501-t0 Version-
ZyxelEx3510-b0 Firmware Version < 5.17\(abup.13\)c0
   ZyxelEx3510-b0 Version-
ZyxelEx3510-b1 Firmware Version < 5.17\(abup.13\)c0
   ZyxelEx3510-b1 Version-
ZyxelEx5401-b0 Firmware Version < 5.17\(abyo.6.4\)c0
   ZyxelEx5401-b0 Version-
ZyxelEx5401-b1 Firmware Version < 5.17\(abyo.6.4\)c0
   ZyxelEx5401-b1 Version-
ZyxelEx5501-b0 Firmware Version < 5.17\(abry.5.3\)c0
   ZyxelEx5501-b0 Version-
ZyxelEx5510-b0 Firmware Version < 5.17\(abqx.11\)c0
   ZyxelEx5510-b0 Version-
ZyxelEx5600-t1 Firmware Version < 5.70\(acdz.3.4\)c0
   ZyxelEx5600-t1 Version-
ZyxelEx5601-t0 Firmware Version < 5.70\(acdz.3.4\)c0
   ZyxelEx5601-t0 Version-
ZyxelEx5601-t1 Firmware Version < 5.70\(acdz.3.4\)c0
   ZyxelEx5601-t1 Version-
ZyxelEx7501-b0 Firmware Version < 5.18\(achn.1.3\)c0
   ZyxelEx7501-b0 Version-
ZyxelEmg3525-t50b Firmware Version < 5.50\(abpm.9.3\)c0
   ZyxelEmg3525-t50b Version-
ZyxelEmg5523-t50b Firmware Version < 5.50\(abpm.9.3\)c0
   ZyxelEmg5523-t50b Version-
ZyxelEmg5723-t50k Firmware Version < 5.50\(abom.8.5\)c0
   ZyxelEmg5723-t50k Version-
ZyxelVmg3625-t50b Firmware Version < 5.50\(abpm.9.3\)c0
   ZyxelVmg3625-t50b Version-
ZyxelVmg3927-t50k Firmware Version < 5.50\(abom.8.5\)c0
   ZyxelVmg3927-t50k Version-
ZyxelVmg8623-t50b Firmware Version < 5.50\(abpm.9.3\)c0
   ZyxelVmg8623-t50b Version-
ZyxelVmg8825-t50k Firmware Version < 5.50\(abom.8.5\)c0
   ZyxelVmg8825-t50k Version-
ZyxelAx7501-b0 Firmware Version < 5.17\(abpc.5.3\)c0
   ZyxelAx7501-b0 Version-
ZyxelAx7501-b1 Firmware Version < 5.17\(abpc.5.3\)c0
   ZyxelAx7501-b1 Version-
ZyxelEx3600-t0 Firmware Version < 5.70\(acif.0.4\)c0
   ZyxelEx3600-t0 Version-
ZyxelPx3321-t1 Firmware Version < 5.44\(acjb.1.1\)c0
   ZyxelPx3321-t1 Version-
ZyxelPx3321-t1 Firmware Version < 5.44\(achk.0.3\)c0
   ZyxelPx3321-t1 Version-
ZyxelPx5301-t0 Firmware Version < 5.44\(ackb.0.1\)c0
   ZyxelPx5301-t0 Version-
ZyxelWx5600-t0 Firmware Version < 5.70\(aceb.3.3\)c0
   ZyxelWx5600-t0 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.24% 0.47
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
security@zyxel.com.tw 4.9 1.2 3.6
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.