Total vulnerabilities in the database
A stack-based buffer overflow in fbwifi_continue.cgi on Zyxel UTM and VPN series of gateways running firmware version V4.30 through to V4.55 allows remote unauthenticated attackers to execute arbitrary code via a crafted http packet.
Software | From | Fixed in |
---|---|---|
zyxel / access_points_firmware | - | 6.10.x |
zyxel / access_points_firmware | 6.10-patch1 | 6.10-patch1.x |
zyxel / access_points_firmware | 6.10-patch2 | 6.10-patch2.x |
zyxel / access_points_firmware | 6.10-patch3 | 6.10-patch3.x |
zyxel / access_points_firmware | 6.10-patch4 | 6.10-patch4.x |
zyxel / access_points_firmware | 6.10-patch5 | 6.10-patch5.x |
zyxel / access_points_firmware | 6.10-patch6 | 6.10-patch6.x |
zyxel / access_points_firmware | 6.10-patch7 | 6.10-patch7.x |
zyxel / access_points_firmware | 6.10 | 6.10.x |
zyxel / zld | 4.30 | 4.55.x |