CVE-2024-29973 Scanner
CVE-2024-29973 scanner - Command Injection vulnerability in Zyxel NAS326 Firmware
Short Info
Level
Critical
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 second
Time Interval
4 week
Scan only one
Domain, Ipv4
Toolbox
-
The Zyxel NAS326 is a network-attached storage device used by both individuals and small businesses to store and share files across a network. Its firmware allows users to manage files, backups, and media streaming efficiently. Zyxel NAS devices are popular for their ease of use, reliability, and integration with various cloud services. The firmware is regularly updated to patch vulnerabilities and improve performance. Security is a crucial aspect as these devices are often exposed to the internet for remote access.
The Command Injection vulnerability exists in Zyxel NAS326 firmware versions before V5.21(AAZF.17)C0. This vulnerability allows an unauthenticated attacker to execute arbitrary OS commands on the device. The issue stems from improper handling of user inputs in the "setCookie" parameter. Exploiting this flaw can lead to full control of the device, compromising all stored data.
The Zyxel NAS326 firmware suffers from a Command Injection vulnerability due to improper sanitization of the "setCookie" parameter in HTTP POST requests. Attackers can exploit this by sending a crafted HTTP request that injects malicious OS commands. The vulnerable endpoint is /cmd,/simZysh/register_main/setCookie
, where the parameter is improperly handled, leading to arbitrary command execution. The attack does not require authentication, making it highly critical. Successful exploitation allows the attacker to run any command on the NAS, potentially leading to data breaches or system compromise.
If this vulnerability is exploited, an attacker can execute arbitrary commands on the Zyxel NAS device, leading to a complete system compromise. This includes the possibility of stealing sensitive data, altering or deleting files, and potentially using the device as a launching pad for further attacks on the network. The integrity, confidentiality, and availability of the data stored on the device could be severely compromised.
By using the S4E platform, users can proactively identify and mitigate vulnerabilities like the Command Injection in Zyxel NAS326 firmware. The platform provides comprehensive reports, real-time monitoring, and alerts to ensure your network-attached storage devices are secure from emerging threats. Becoming a member gives you access to a suite of tools designed to protect your digital assets from unauthorized access and potential data breaches. Stay ahead of cyber threats with securityforEveryone's expert guidance and automated scanning solutions.
References: