CVE-2023-22914

EUVD-2023-27016
A path traversal vulnerability in the “account_print.cgi” CGI program of Zyxel USG FLEX series firmware versions 4.50 through 5.35, and VPN series firmware versions 4.30 through 5.35, which could allow a remote authenticated attacker with administrator privileges to execute unauthorized OS commands in the “tmp” directory by uploading a crafted file if the hotspot function were enabled.
Path Traversal
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.2 HIGH
NETWORK
LOW
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
ZyxelCNA
7.2 HIGH
NETWORK
LOW
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 76%
Affected Products (NVD)
VendorProductVersion
zyxelusg_flex_100_firmware
4.50 ≤
𝑥
≤ 5.35
zyxelusg_flex_100w_firmware
4.50 ≤
𝑥
≤ 5.35
zyxelusg_flex_200_firmware
4.50 ≤
𝑥
≤ 5.35
zyxelusg_flex_50_firmware
4.50 ≤
𝑥
≤ 5.35
zyxelusg_flex_50w_firmware
4.50 ≤
𝑥
≤ 5.35
zyxelusg_flex_500_firmware
4.50 ≤
𝑥
≤ 5.35
zyxelusg_flex_700_firmware
4.50 ≤
𝑥
≤ 5.35
zyxelvpn100_firmware
4.50 ≤
𝑥
≤ 5.35
zyxelvpn1000_firmware
4.50 ≤
𝑥
≤ 5.35
zyxelvpn300_firmware
4.50 ≤
𝑥
≤ 5.35
zyxelvpn50_firmware
4.50 ≤
𝑥
≤ 5.35
𝑥
= Vulnerable software versions