{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-7261","assignerOrgId":"96e50032-ad0d-4058-a115-4d2c13821f9f","state":"PUBLISHED","assignerShortName":"Zyxel","dateReserved":"2024-07-30T02:42:19.589Z","datePublished":"2024-09-03T02:10:25.112Z","dateUpdated":"2024-09-05T15:36:14.807Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"NWA1123ACv3 firmware","vendor":"Zyxel","versions":[{"status":"affected","version":"<= 6.70(ABVT.4)"}]},{"defaultStatus":"unaffected","product":"WAC500 firmware","vendor":"Zyxel","versions":[{"status":"affected","version":"<= 6.70(ABVS.4)"}]},{"defaultStatus":"unaffected","product":"WAX655E firmware","vendor":"Zyxel","versions":[{"status":"affected","version":"<= 7.00(ACDO.1)"}]},{"defaultStatus":"unaffected","product":"WBE530 firmware","vendor":"Zyxel","versions":[{"status":"affected","version":"<= 7.00(ACLE.1)"}]},{"defaultStatus":"unaffected","product":"USG LITE 60AX firmware","vendor":"Zyxel","versions":[{"status":"affected","version":"V2.00(ACIP.2)"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"The improper neutralization of special elements in the parameter \"host\" in the CGI program of Zyxel NWA1123ACv3 firmware version 6.70(ABVT.4) and earlier, WAC500 firmware version 6.70(ABVS.4) \n\n<span style=\"background-color: rgb(255, 255, 255);\">and earlier</span>, WAX655E firmware version 7.00(ACDO.1) and earlier, WBE530 firmware version 7.00(ACLE.1) \n\n<span style=\"background-color: rgb(255, 255, 255);\">and earlier</span>, and&nbsp;USG LITE 60AX firmware version&nbsp;V2.00(ACIP.2) could allow an unauthenticated attacker to execute OS commands by sending a crafted cookie to a vulnerable device."}],"value":"The improper neutralization of special elements in the parameter \"host\" in the CGI program of Zyxel NWA1123ACv3 firmware version 6.70(ABVT.4) and earlier, WAC500 firmware version 6.70(ABVS.4) \n\nand earlier, WAX655E firmware version 7.00(ACDO.1) and earlier, WBE530 firmware version 7.00(ACLE.1) \n\nand earlier, and USG LITE 60AX firmware version V2.00(ACIP.2) could allow an unauthenticated attacker to execute OS commands by sending a crafted cookie to a vulnerable device."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-78","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"96e50032-ad0d-4058-a115-4d2c13821f9f","shortName":"Zyxel","dateUpdated":"2024-09-03T02:10:25.112Z"},"references":[{"tags":["vendor-advisory"],"url":"https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-os-command-injection-vulnerability-in-aps-and-security-router-devices-09-03-2024"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"affected":[{"vendor":"zyxel","product":"usg_lite_60ax_firmware","cpes":["cpe:2.3:o:zyxel:usg_lite_60ax_firmware:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"V2.00\\(ACIP.2\\)","versionType":"custom"}]},{"vendor":"zyxel","product":"nwa1123acv3_firmware","cpes":["cpe:2.3:o:zyxel:nwa1123acv3_firmware:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"6.70\\(ABVT.4\\)","versionType":"custom"}]},{"vendor":"zyxel","product":"wac500_firmware","cpes":["cpe:2.3:o:zyxel:wac500_firmware:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"6.70\\(ABVS.4\\)","versionType":"custom"}]},{"vendor":"zyxel","product":"wax655e_firmware","cpes":["cpe:2.3:o:zyxel:wax655e_firmware:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"7.00\\(ACDO.1\\)","versionType":"custom"}]},{"vendor":"zyxel","product":"wbe530_firmware","cpes":["cpe:2.3:o:zyxel:wbe530_firmware:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"7.00\\(ACLE.1\\)","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-05T03:55:55.275964Z","id":"CVE-2024-7261","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-05T15:36:14.807Z"}}]}}