Vulnerability Description
A command injection vulnerability was discovered on the Zyxel EMG2926 home router with firmware V1.00(AAQT.4)b8. The vulnerability is located in the diagnostic tools, specifically the nslookup function. A malicious user may exploit numerous vectors to execute arbitrary commands on the router, such as the ping_ip parameter to the expert/maintenance/diagnostic/nslookup URI.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zyxel | Emg2926 Firmware | v1.00\(aaqt.4\)b8 |
| Zyxel | Emg2926 | - |
Related Weaknesses (CWE)
References
- https://www.exploit-db.com/exploits/41782/ExploitThird Party AdvisoryVDB Entry
- https://www.exploit-db.com/exploits/41782/ExploitThird Party AdvisoryVDB Entry
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-US Government Resource
FAQ
What is CVE-2017-6884?
CVE-2017-6884 is a vulnerability with a CVSS score of 8.8 (HIGH). A command injection vulnerability was discovered on the Zyxel EMG2926 home router with firmware V1.00(AAQT.4)b8. The vulnerability is located in the diagnostic tools, specifically the nslookup functio...
How severe is CVE-2017-6884?
CVE-2017-6884 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-6884?
Check the references section above for vendor advisories and patch information. Affected products include: Zyxel Emg2926 Firmware, Zyxel Emg2926.