Multiple ZyXEL network-attached storage (NAS) devices running firmware version 5.21 contain a pre-authentication command injection vulnerability, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable device. ZyXEL NAS devices achieve authent
Multiple ZyXEL network-attached storage (NAS) devices running firmware version 5.21 contain a pre-authentication command injection vulnerability, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable device. ZyXEL NAS devices achieve authentication by using the weblogin.cgi CGI executable. This program fails to properly sanitize the username parameter that…
| Vendor | Product | Versions |
|---|---|---|
| ZyXEL | NAS326 | V5.21(AAZF.7)C0 |
| ZyXEL | NAS520 | V5.21(AASZ.3)C0 |
| ZyXEL | NAS540 | V5.21(AATB.4)C0 |
| ZyXEL | NAS542 | V5.21(ABAG.4)C0 |
| ZyXEL | NSA210 | all |
| ZyXEL | NSA220 | all |
| ZyXEL | NSA220+ | all |
| ZyXEL | NSA221 | all |
| ZyXEL | NSA310 | V4.75(AALH.2)C0 |
| ZyXEL | NSA320 | all |
| ZyXEL | NSA320S | V4.75(AANV.2)C0 |
| ZyXEL | NSA325 | V4.81(AAAJ.1)C0 |
| ZyXEL | NSA325v2 | V4.81(AALS.1)C0 |
Yes — actively exploited. Added to the CISA KEV catalog on 2022-03-25. Ransomware use: Unknown.
For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.
Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:
No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.