漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
N/A
Vulnerability Description
A post‑authentication command injection vulnerability in the Dynamic DNS (DDNS) configuration CLI command in Zyxel ATP series firmware versions from V5.35 through V5.41, USG FLEX series firmware versions from V5.35 through V5.41, USG FLEX 50(W) series firmware versions from V5.35 through V5.41, and USG20(W)-VPN series firmware versions from V5.35 through V5.41 could allow an authenticated attacker with administrator privileges to execute operating system (OS) commands on an affected device by supplying a specially crafted string as an argument to the CLI command.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Vulnerability Type
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
Vulnerability Title
Zyxel多款产品 操作系统命令注入漏洞
Vulnerability Description
Zyxel USG FLEX等都是中国合勤(Zyxel)公司的产品。Zyxel USG FLEX是一款防火墙。Zyxel ATP是一款防火墙。Zyxel USG FLEX 50(W)/ USG20(W)-VPN是一系列防火墙。 Zyxel多款产品存在操作系统命令注入漏洞,该漏洞源于DDNS配置CLI命令存在身份验证后命令注入,可能导致执行操作系统命令。以下产品及版本受到影响:ATP系列固件 V5.35版本至V5.41版本、USG FLEX系列固件 V5.35版本至V5.41版本、USG FLEX 50(W
CVSS Information
N/A
Vulnerability Type
N/A