Zyxel has released software updates to address a critical security flaw affecting certain versions of access points (APs) and security routers that could lead to the execution of unauthorized commands.
Tracked as CVE-2024-7261 (CVSS Score: 9.8), the vulnerability was described as an operating system (OS) command injection case.
“Improper neutralization of special elements in the ‘host’ parameters in the CGI program of some AP and security router versions could allow an unauthenticated attacker to execute OS commands by sending a crafted cookie to a vulnerable device,” Zyxel said. said in the consulting room.
Chengchao Ai of Fuzhou University’s ROIS team is credited with discovering and reporting the flaw.
Zyxel has it too sent updates for seven vulnerabilities in routers and firewalls, including several with high severity that could lead to OS command execution, denial of service (DoS), or browser-based information access –
- CVE-2024-5412 (CVSS Score: 7.5) – Buffer overflow vulnerability in the “libclinkc” library, which could allow an unauthenticated attacker to cause DoS conditions via a specially crafted HTTP request
- CVE-2024-6343 (CVSS Score: 4.9) – Buffer overflow vulnerability that could allow an authenticated attacker with administrative privileges to cause DoS conditions via a specially crafted HTTP request
- CVE-2024-7203 (CVSS Score: 7.2) – Post-authentication command injection vulnerability that could allow an authenticated attacker with administrative privileges to execute OS commands
- CVE-2024-42057 (CVSS Score: 8.1) – Command injection vulnerability in the IPSec VPN function, which could allow an unauthenticated attacker to execute certain OS commands
- CVE-2024-42058 (CVSS Score: 7.5) – Null pointer dereferencing vulnerability that could allow an unauthenticated attacker to cause DoS conditions by sending crafted packets
- CVE-2024-42059 (CVSS Score: 7.2) – Post-authentication command injection vulnerability that could allow an authenticated attacker with administrative privileges to execute certain OS commands by uploading a crafted compressed language file via FTP
- CVE-2024-42060 (CVSS Score: 7.2) – A post-authentication command injection vulnerability in some firewall versions could allow an authenticated attacker with administrative privileges to execute certain OS commands
- CVE-2024-42061 (CVSS Score: 6.1) – A demonstrated cross-site scripting (XSS) vulnerability in the CGI program “dynamic_script.cgi” could allow an attacker to trick a user into visiting a crafted URL with an XSS payload and obtain browser-based information
The development comes as D-Link said four security vulnerabilities affecting its DIR-846 router, including two critical remote command execution vulnerabilities (CVE-2024-44342, CVSS score: 9.8), will not be patched due to the products reaching status in February 2020 end of life (EoL). , urging customers to replace them with supported versions.