QID 731233

Date Published: 2024-03-14

QID 731233: Zyxel Network Attached Storage (NAS) and Firewall Remote Code Execution (RCE) Vulnerability

Zyxel Communications Corp. is a manufacturer of DSL and other networking devices.

CVE-2020-9054: A remote code execution vulnerability was identified in the weblogin.cgi program used in Zyxel NAS and firewall products. Missing authentication for the program could allow attackers to perform remote code execution via OS command injection.

Affected Versions:
Zyxel NAS products running firmware version 5.21 and earlier
Zyxel UTM, ATP, and VPN firewalls running firmware version ZLD V4.35 Patch 0 through ZLD V4.35 Patch 2

QID Detection Logic:
This detection involves sending a malicious GET request to retrieve the "/etc/passwd" file from the target server as a response.

Successful exploitation of this vulnerability may allow an unauthenticated attacker to execute arbitrary code on the target system.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as Critical - 10 severity.
  • Solution
    Customers are advised to upgrade to latest firmware versions. Please refer to Zyxel Security Advisory for further information.

    CVEs related to QID 731233

    Software Advisories
    Advisory ID Software Component Link
    Zyxel Security Advisory URL Logo www.zyxel.com/support/remote-code-execution-vulnerability-of-NAS-products.shtml