Total vulnerabilities in the database
The configuration parser fails to sanitize user-controlled input in the Zyxel ATP series firmware versions 5.10 through 5.36, USG FLEX series firmware versions 5.00 through 5.36, USG FLEX 50(W) series firmware versions 5.10 through 5.36,
USG20(W)-VPN series firmware versions 5.10 through 5.36, and VPN series firmware versions 5.00 through 5.36. An unauthenticated, LAN-based attacker could leverage the vulnerability to inject some operating system (OS) commands into the device configuration data on an affected device when the cloud management mode is enabled.
Software | From | Fixed in |
---|---|---|
zyxel / usg_2200-vpn_firmware | 5.00 | 5.37 |
zyxel / usg_flex_100_firmware | 5.00 | 5.37 |
zyxel / usg_flex_100w_firmware | 5.00 | 5.37 |
zyxel / usg_flex_200_firmware | 5.00 | 5.37 |
zyxel / usg_flex_50_firmware | 5.00 | 5.37 |
zyxel / usg_flex_500_firmware | 5.00 | 5.37 |
zyxel / usg_flex_50w_firmware | 5.00 | 5.37 |
zyxel / usg_flex_700_firmware | 5.00 | 5.37 |
zyxel / zywall_vpn100_firmware | 5.00 | 5.37 |
zyxel / zywall_vpn2s_firmware | 5.00 | 5.37 |
zyxel / zywall_vpn300_firmware | 5.00 | 5.37 |
zyxel / zywall_vpn50_firmware | 5.00 | 5.37 |
zyxel / zywall_vpn_100_firmware | 5.00 | 5.37 |
zyxel / zywall_vpn_300_firmware | 5.00 | 5.37 |
zyxel / zywall_vpn_50_firmware | 5.00 | 5.37 |
zyxel / usg_20w-vpn_firmware | 5.10 | 5.37 |
zyxel / zywall_atp100_firmware | 5.10 | 5.37 |
zyxel / zywall_atp100w_firmware | 5.10 | 5.37 |
zyxel / zywall_atp200_firmware | 5.10 | 5.37 |
zyxel / zywall_atp500_firmware | 5.10 | 5.37 |
zyxel / zywall_atp700_firmware | 5.10 | 5.37 |
zyxel / zywall_atp800_firmware | 5.10 | 5.37 |