HomePentest-Tools.com Logo

ZyXEL Firewall - Unauthenticated Remote Command Injection (CVE-2022-30525)

CVSSv3 Score
Vulnerability description

ZyXEL Firewall is affected by an OS Command Injection vulnerability, located in the /ztp/cgi-bin/handler endpoint. The root cause of this vulnerability is the ability to pass unsanitized input to the os.system method in lib_wan_settings.py. A remote unauthenticated attacker could use the Common Gateway Interface (CGI) to send commands to the server via HTTP POST requests.

Risk description

The risk exists that a remote unauthenticated attacker can fully compromise the firewall device in order to steal confidential information, install ransomware, or pivot to the internal network.

Exploit capabilities

Sniper can gain unauthenticated Remote Code Execution on the target system and extract multiple artefacts as evidence.


Upgrade the firmware on the ZyXEL product to the latest version as instructed in the advisory.

Not available
Detectable with
Network Scanner
Exploitable with Sniper
Vuln date
May 2022
Published at
Updated at
Software Type
ZyXEL Networks
ZyXEL Firewall