Vulnerability Description
The post-authentication command injection vulnerability in Zyxel NAS326 firmware versions through V5.21(AAZF.15)C0 and NAS542 firmware versions through V5.21(ABAG.12)C0 could allow an authenticated attacker with administrator privileges to execute some operating system (OS) commands by sending a crafted query parameter attached to the URL of an affected device’s web management interface.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zyxel | Nas326 Firmware | < 5.21\(aazf.16\)c0 |
| Zyxel | Nas326 | - |
| Zyxel | Nas542 Firmware | < 5.21\(abag.13\)c0 |
| Zyxel | Nas542 | - |
Related Weaknesses (CWE)
References
- https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisVendor Advisory
- https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisVendor Advisory
FAQ
What is CVE-2023-5372?
CVE-2023-5372 is a vulnerability with a CVSS score of 7.2 (HIGH). The post-authentication command injection vulnerability in Zyxel NAS326 firmware versions through V5.21(AAZF.15)C0 and NAS542 firmware versions through V5.21(ABAG.12)C0 could allow an authenticated at...
How severe is CVE-2023-5372?
CVE-2023-5372 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-5372?
Check the references section above for vendor advisories and patch information. Affected products include: Zyxel Nas326 Firmware, Zyxel Nas326, Zyxel Nas542 Firmware, Zyxel Nas542.