Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Zyxel | USG FLEX 100(W) firmware | 5.00 through 5.21 Patch 1 | - | |
| Zyxel | USG FLEX 200 firmware | 5.00 through 5.21 Patch 1 | - | |
| Zyxel | USG FLEX 500 firmware | 5.00 through 5.21 Patch 1 | - | |
| Zyxel | USG FLEX 700 firmware | 5.00 through 5.21 Patch 1 | - | |
| Zyxel | ATP series firmware | 5.10 through 5.21 Patch 1 | - | |
| Zyxel | VPN series firmware | 4.60 through 5.21 Patch 1 | - | |
| Zyxel | USG FLEX 50(W) firmware | 5.10 through 5.21 Patch 1 | - | |
| Zyxel | USG 20(W)-VPN firmware | 5.10 through 5.21 Patch 1 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Proof of concept exploit for CVE-2022-30525 (Zxyel firewall command injection) | https://github.com/jbaines-r7/victorian_machinery | POC Details |
| 2 | Zyxel 防火墙远程命令注入漏洞(CVE-2022-30525) | https://github.com/Henry4E36/CVE-2022-30525 | POC Details |
| 3 | Zyxel 防火墙远程命令注入漏洞(CVE-2022-30525)批量检测脚本 | https://github.com/shuai06/CVE-2022-30525 | POC Details |
| 4 | Zyxel 防火墙未经身份验证的远程命令注入 | https://github.com/savior-only/CVE-2022-30525 | POC Details |
| 5 | Zyxel Firewall Remote Command Injection Vulnerability (CVE-2022-30525) Batch Detection Script | https://github.com/M4fiaB0y/CVE-2022-30525 | POC Details |
| 6 | CVE-2022-30525(Zxyel 防火墙命令注入)的概念证明漏洞利用 | https://github.com/k0sf/CVE-2022-30525 | POC Details |
| 7 | CVE-2022-30525 POC exploit | https://github.com/superzerosec/CVE-2022-30525 | POC Details |
| 8 | Simple python script to exploit CVE-2022-30525 (FIXED): Zyxel Firewall Unauthenticated Remote Command Injection | https://github.com/Chocapikk/CVE-2022-30525-Reverse-Shell | POC Details |
| 9 | CVE-2022-30525 Zyxel防火墙命令注入漏洞 POC&EXP | https://github.com/160Team/CVE-2022-30525 | POC Details |
| 10 | Simple python script to exploit CVE-2022-30525 (FIXED): Zyxel Firewall Unauthenticated Remote Command Injection | https://github.com/zhefox/CVE-2022-30525-Reverse-Shell | POC Details |
| 11 | Initial POC for the CVE-2022-30525 | https://github.com/iveresk/cve-2022-30525 | POC Details |
| 12 | CVE-2022-30525 Zyxel 防火墙命令注入漏洞 POC&EXPC | https://github.com/west9b/CVE-2022-30525 | POC Details |
| 13 | A OS Command Injection Vulnerability in the CGI Program of Zyxel | https://github.com/furkanzengin/CVE-2022-30525 | POC Details |
| 14 | CVE-2022-30525 POC | https://github.com/ProngedFork/CVE-2022-30525 | POC Details |
| 15 | None | https://github.com/cbk914/CVE-2022-30525_check | POC Details |
| 16 | Exploit for CVE-2022-30525 | https://github.com/arajsingh-infosec/CVE-2022-30525_Exploit | POC Details |
| 17 | Simple python script to exploit CVE-2022-30525 (FIXED): Zyxel Firewall Unauthenticated Remote Command Injection | https://github.com/5l1v3r1/CVE-2022-30525-Reverse-Shell | POC Details |
| 18 | An OS command injection vulnerability in the CGI program of Zyxel USG FLEX 100(W) firmware versions 5.00 through 5.21 Patch 1, USG FLEX 200 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 500 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 700 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 50(W) firmware versions 5.10 through 5.21 Patch 1, USG20(W)-VPN firmware versions 5.10 through 5.21 Patch 1, ATP series firmware versions 5.10 through 5.21 Patch 1, VPN series firmware versions 4.60 through 5.21 Patch 1, are susceptible to a command injection vulnerability which could allow an attacker to modify specific files and then execute some OS commands on a vulnerable device. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-30525.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet