** UNSUPPORTED WHEN ASSIGNED **
The command injection vulnerability in the “setCookie” parameter in Zyxel NAS326 firmware versions before V5.21(AAZF.17)C0 and NAS542 firmware versions before V5.21(ABAG.14)C0 could allow an unauthenticated attacker to execute some operating system (OS) commands by sending a crafted HTTP POST request.
Metrics
Affected Vendors & Products
References
History
Wed, 22 Jan 2025 23:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Zyxel
Zyxel nas326 Zyxel nas326 Firmware Zyxel nas542 Zyxel nas542 Firmware |
|
CPEs | cpe:2.3:h:zyxel:nas326:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:nas542:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:nas326_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:nas542_firmware:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Zyxel
Zyxel nas326 Zyxel nas326 Firmware Zyxel nas542 Zyxel nas542 Firmware |

Status: PUBLISHED
Assigner: Zyxel
Published:
Updated: 2024-08-02T01:17:58.484Z
Reserved: 2024-03-22T08:49:44.342Z
Link: CVE-2024-29973

Updated: 2024-08-02T01:17:58.484Z

Status : Analyzed
Published: 2024-06-04T02:15:48.290
Modified: 2025-01-22T22:40:25.990
Link: CVE-2024-29973

No data.