QID 731144

Date Published: 2024-02-21

QID 731144: Zyxel ATP Firewall OS Command Injection Vulnerability (CVE-2023-28771)

Zyxel Communications Corp. is a manufacturer of DSL and other networking devices.

CVE-2023-28771: Improper error message handling in some firewall versions could allow an unauthenticated attacker to execute some OS commands remotely by sending crafted packets to an affected device.

Affected Versions:
ATP ZLD V4.60 prior to V5.36

QID Detection Logic (Unauthenticated):
This QID checks for installed vulnerable firmware version by sending GET request to endpoint "ext-js/app/common/zld_product_spec.js".

Successful exploitation of this vulnerability may allow an unauthenticated attacker to execute some OS commands remotely by sending crafted packets to an affected device.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    Customer are advised to update the device firmware.
    For more details please refer to Zyxel Security Advisory.

    CVEs related to QID 731144

    Software Advisories
    Advisory ID Software Component Link
    Zyxel Security Advisory URL Logo www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-remote-command-injection-vulnerability-of-firewalls