A buffer overflow vulnerability in the “fbwifi_forward.cgi” CGI program of Zyxel USG FLEX series firmware versions 4.50 through 5.35, USG FLEX 50(W) firmware versions 4.30 through 5.35, USG20(W)-VPN firmware versions 4.30 through 5.35, and VPN series firmware versions 4.30 through 5.35, which could allow a remote unauthenticated attacker to cause DoS conditions by sending a crafted HTTP request if the Facebook WiFi function were enabled on an affected device.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
Configuration 12 (hide)
AND |
|
History
04 May 2023, 14:44
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CWE | CWE-120 | |
References | (CONFIRM) https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-of-firewalls-and-aps - Vendor Advisory | |
First Time |
Zyxel usg Flex 200
Zyxel vpn50 Zyxel usg Flex 100 Firmware Zyxel Zyxel vpn50 Firmware Zyxel vpn1000 Zyxel vpn1000 Firmware Zyxel usg Flex 500 Firmware Zyxel usg Flex 50w Firmware Zyxel usg Flex 700 Zyxel vpn300 Firmware Zyxel usg 20w-vpn Firmware Zyxel usg Flex 100 Zyxel vpn100 Firmware Zyxel usg Flex 100w Zyxel vpn300 Zyxel usg Flex 100w Firmware Zyxel usg Flex 200 Firmware Zyxel vpn100 Zyxel usg Flex 50 Firmware Zyxel usg Flex 50 Zyxel usg Flex 700 Firmware Zyxel usg Flex 50w Zyxel usg 20w-vpn Zyxel usg Flex 500 |
|
CPE | cpe:2.3:h:zyxel:usg_flex_100w:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_500_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_700:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_200:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vpn50:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_100w_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_50w:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_500:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:vpn1000_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_100:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vpn1000:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_700_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:vpn300_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_50_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vpn100:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_flex_50:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_50w_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:vpn100_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_20w-vpn_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:usg_20w-vpn:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:usg_flex_200_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:vpn300:-:*:*:*:*:*:*:* cpe:2.3:o:zyxel:vpn50_firmware:*:*:*:*:*:*:*:* |
24 Apr 2023, 17:43
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-04-24 17:15
Updated : 2023-05-04 14:44
NVD link : CVE-2023-22915
Mitre link : CVE-2023-22915
JSON object : View
Products Affected
zyxel
- usg_flex_500
- usg_flex_200_firmware
- usg_flex_50
- usg_flex_500_firmware
- vpn300
- usg_20w-vpn_firmware
- usg_flex_50w_firmware
- vpn1000_firmware
- vpn100
- usg_flex_700_firmware
- usg_flex_50w
- vpn300_firmware
- usg_flex_100w_firmware
- vpn50
- usg_flex_100
- vpn100_firmware
- usg_flex_100_firmware
- usg_flex_700
- vpn1000
- usg_20w-vpn
- usg_flex_50_firmware
- usg_flex_200
- vpn50_firmware
- usg_flex_100w
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')