Vulnerability Description
**UNSUPPORTED WHEN ASSIGNED** A command injection vulnerability in the export-cgi program of Zyxel NAS326 firmware versions through V5.21(AAZF.18)C0 and NAS542 firmware versions through V5.21(ABAG.15)C0 could allow an unauthenticated attacker to execute some operating system (OS) commands by sending a crafted HTTP POST request.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zyxel | Nas326 Firmware | < 5.21\(aazf.18\)c0 |
| Zyxel | Nas326 | - |
| Zyxel | Nas542 Firmware | < 5.21\(abag.15\)c0 |
| Zyxel | Nas542 | - |
Related Weaknesses (CWE)
References
FAQ
What is CVE-2024-6342?
CVE-2024-6342 is a vulnerability with a CVSS score of 9.8 (CRITICAL). **UNSUPPORTED WHEN ASSIGNED** A command injection vulnerability in the export-cgi program of Zyxel NAS326 firmware versions through V5.21(AAZF.18)C0 and NAS542 firmware versions through V5.21(ABAG.15)...
How severe is CVE-2024-6342?
CVE-2024-6342 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-6342?
Check the references section above for vendor advisories and patch information. Affected products include: Zyxel Nas326 Firmware, Zyxel Nas326, Zyxel Nas542 Firmware, Zyxel Nas542.