** UNSUPPORTED WHEN ASSIGNED **
The improper privilege management vulnerability in the SUID executable binary in Zyxel NAS326 firmware versions before V5.21(AAZF.17)C0 and NAS542 firmware versions before V5.21(ABAG.14)C0 could allow an authenticated local attacker with administrator privileges to execute some system commands as the “root” user on a vulnerable device.
CVSS
No CVSS.
References
Link | Resource |
---|---|
https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities/ | Exploit Third Party Advisory |
https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities/ | Exploit Third Party Advisory |
https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-nas-products-06-04-2024 | Vendor Advisory |
https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-nas-products-06-04-2024 | Vendor Advisory |
Configurations
History
22 Jan 2025, 22:48
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : unknown |
First Time |
Zyxel nas326
Zyxel nas542 Zyxel Zyxel nas326 Firmware Zyxel nas542 Firmware |
|
CPE | cpe:2.3:o:zyxel:nas326_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zyxel:nas542_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:zyxel:nas326:-:*:*:*:*:*:*:* cpe:2.3:h:zyxel:nas542:-:*:*:*:*:*:*:* |
|
References | () https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-nas-products-06-04-2024 - Vendor Advisory | |
References | () https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities/ - Exploit, Third Party Advisory |
04 Jun 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-04 02:15
Updated : 2025-01-22 22:48
NVD link : CVE-2024-29975
Mitre link : CVE-2024-29975
JSON object : View
Products Affected
zyxel
- nas326
- nas542
- nas542_firmware
- nas326_firmware
CWE