Zyxel, a communications company, has released an advisory warning users of a critical input validation vulnerability impacting many of its router models. CVE-2024-7261, with a CVSS score of 9.8, could potentially allow unauthenticated attackers to perform OS command injection.
According to Zyxel, the improper neutralization of special characters in the “host” parameter within the CGI program of certain AP and security router versions could enable an unauthenticated attacker to execute OS commands by sending a specially crafted cookie to a vulnerable device. At the time of this blog’s release, no PoC or technical details had been released for this CVE.
Detect and patch critical vulnerabilities with a patch management tool.
Products Affected and Patches
Zyxel has listed the following router models as vulnerable in their advisory:
Product | Affected model | Affected version | Patch availability |
---|---|---|---|
AP | NWA50AX | 7.00(ABYW.1) and earlier | 7.00(ABYW.2) |
NWA50AX PRO | 7.00(ACGE.1) and earlier | 7.00(ACGE.2) | |
NWA55AXE | 7.00(ABZL.1) and earlier | 7.00(ABZL.2) | |
NWA90AX | 7.00(ACCV.1) and earlier | 7.00(ACCV.2) | |
NWA90AX PRO | 7.00(ACGF.1) and earlier | 7.00(ACGF.2) | |
NWA110AX | 7.00(ABTG.1) and earlier | 7.00(ABTG.2) | |
NWA130BE | 7.00(ACIL.1) and earlier | 7.00(ACIL.2) | |
NWA210AX | 7.00(ABTD.1) and earlier | 7.00(ABTD.2) | |
NWA220AX-6E | 7.00(ACCO.1) and earlier | 7.00(ACCO.2) | |
NWA1123-AC PRO | 6.28(ABHD.0) and earlier | 6.28(ABHD.3) | |
NWA1123ACv3 | 6.70(ABVT.4) and earlier | 6.70(ABVT.5) | |
WAC500 | 6.70(ABVS.4) and earlier | 6.70(ABVS.5) | |
WAC500H | 6.70(ABWA.4) and earlier | 6.70(ABWA.5) | |
WAC6103D-I | 6.28(AAXH.0) and earlier | 6.28(AAXH.3) | |
WAC6502D-S | 6.28(AASE.0) and earlier | 6.28(AASE.3) | |
WAC6503D-S | 6.28(AASF.0) and earlier | 6.28(AASF.3) | |
WAC6552D-S | 6.28(ABIO.0) and earlier | 6.28(ABIO.3) | |
WAC6553D-E | 6.28(AASG.2) and earlier | 6.28(AASG.3) | |
WAX300H | 7.00(ACHF.1) and earlier | 7.00(ACHF.2) | |
WAX510D | 7.00(ABTF.1) and earlier | 7.00(ABTF.2) | |
WAX610D | 7.00(ABTE.1) and earlier | 7.00(ABTE.2) | |
WAX620D-6E | 7.00(ACCN.1) and earlier | 7.00(ACCN.2) | |
WAX630S | 7.00(ABZD.1) and earlier | 7.00(ABZD.2) | |
WAX640S-6E | 7.00(ACCM.1) and earlier | 7.00(ACCM.2) | |
WAX650S | 7.00(ABRM.1) and earlier | 7.00(ABRM.2) | |
WAX655E | 7.00(ACDO.1) and earlier | 7.00(ACDO.2) | |
WBE530 | 7.00(ACLE.1) and earlier | 7.00(ACLE.2) | |
WBE660S | 7.00(ACGG.1) and earlier | 7.00(ACGG.2) | |
Security router | USG LITE 60AX | V2.00(ACIP.2) | V2.00(ACIP.3)* |
The vendor has not provided mitigations, but patches have been released for each vulnerable model, as is seen in the above table.
Instantly Fix Risks with SanerNow Patch Management
SanerNow patch management is a continuous, automated, and integrated software that instantly fixes risks exploited in the wild. The software supports major operating systems like Windows, Linux, and macOS, as well as 550+ third-party applications.
It also allows you to set up a safe testing area to test patches before deploying them in a primary production environment. SanerNow patch management additionally supports a patch rollback feature in case of patch failure or a system malfunction.
Experience the fastest and most accurate patching software here.