HomePentest-Tools.com Logo

ZyXEL Firewall - Unauthenticated Remote Command Injection (CVE-2022-30525)

Severity
CVSSv3 Score
9.8
Exploitable with Sniper
Yes
Vulnerability description

ZyXEL Firewall is affected by an OS Command Injection vulnerability, located in the /ztp/cgi-bin/handler endpoint. The root cause of this vulnerability is the ability to pass unsanitized input to the os.system method in lib_wan_settings.py. A remote unauthenticated attacker could use the Common Gateway Interface (CGI) to send commands to the server via HTTP POST requests.

Exploit capabilities

Sniper can gain unauthenticated Remote Code Execution on the target system and extract multiple artefacts as evidence.

Risk description

The risk exists that a remote unauthenticated attacker can fully compromise the firewall device in order to steal confidential information, install ransomware, or pivot to the internal network.

Recommendation

Upgrade the firmware on the ZyXEL product to the latest version as instructed in the advisory.

Detectable with
Network Scanner
Vuln date
May 2022
Published at
Updated at
Software Type
Firewall
Vendor
ZyXEL Networks
Product
ZyXEL Firewall
Codename
Not available