A OS command injection vulnerability in the CGI program of Zyxel USG FLEX 100(W) firmware versions 5.00 through 5.21 Patch 1, USG FLEX 200 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 500 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 700 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 50(W) firmware versions 5.10 through 5.21 Patch 1, USG20(W)-VPN firmware versions 5.10 through 5.21 Patch 1, ATP series firmware versions 5.10 through 5.21 Patch 1, VPN series firmware versions 4.60 through 5.21 Patch 1, which could allow an attacker to modify specific files and then execute some OS commands on a vulnerable device.
Published 2022-05-12 14:15:07
Updated 2022-10-19 18:32:19
View at NVD,   CVE.org

Products affected by CVE-2022-30525

CVE-2022-30525 is in the CISA Known Exploited Vulnerabilities Catalog

CISA vulnerability name:
Zyxel Multiple Firewalls OS Command Injection Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
A command injection vulnerability in the CGI program of some Zyxel firewall versions could allow an attacker to modify specific files and then execute some OS commands on a vulnerable device.
Notes:
https://nvd.nist.gov/vuln/detail/CVE-2022-30525
Added on 2022-05-16 Action due date 2022-06-06

Exploit prediction scoring system (EPSS) score for CVE-2022-30525

97.37%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less

Metasploit modules for CVE-2022-30525

  • Zyxel Firewall ZTP Unauthenticated Command Injection
    Disclosure Date: 2022-04-28
    First seen: 2022-12-23
    exploit/linux/http/zyxel_ztp_rce
    This module exploits CVE-2022-30525, an unauthenticated remote command injection vulnerability affecting Zyxel firewalls with zero touch provisioning (ZTP) support. By sending a malicious setWanPortSt command containing an mtu field with a crafted OS command

CVSS scores for CVE-2022-30525

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
10.0
HIGH AV:N/AC:L/Au:N/C:C/I:C/A:C
10.0
10.0
NIST
9.8
CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
3.9
5.9
NIST
9.8
CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
3.9
5.9
Zyxel Corporation

CWE ids for CVE-2022-30525

References for CVE-2022-30525

Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!