CVE-2024-8748

A buffer overflow vulnerability in the packet parser of the third-party library "libclinkc" in Zyxel VMG8825-T50K firmware versions through V5.50(ABOM.8.4)C0 could allow an attacker to cause a temporary denial of service (DoS) condition against the web management interface by sending a crafted HTTP POST request to a vulnerable device.
Classic Buffer Overflow
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
ZyxelCNA
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 44%
VendorProductVersion
zyxellte3301-plus_firmware
𝑥
< 1.00\(abqu.6\)c0
zyxellte5388-m804_firmware
𝑥
< 1.00\(absq.5\)c0
zyxellte5398-m904_firmware
𝑥
< 1.00\(abq.5\)c0
zyxellte7480-m804_firmware
𝑥
< 1.00\(abra.10\)c0
zyxellte7490-m904_firmware
𝑥
< 1.00\(abqy.9\)c0
zyxelnr7101_firmware
𝑥
< 1.00\(abu.11\)c0
zyxelnr7102_firmware
𝑥
< 1.00\(abyd.4\)c0
zyxelnebula_nr5101_firmware
𝑥
< 1.16\(accg.1\)c0
zyxelnebula_nr7101_firmware
𝑥
< 1.16\(accc.1\)c0
zyxelnebula_lte3301-plus_firmware
𝑥
< 1.18\(acca.5\)c0
zyxeldx3300-t0_firmware
𝑥
< 5.50\(aby.5.4\)c0
zyxeldx3300-t1_firmware
𝑥
< 5.50\(aby.5.4\)c0
zyxeldx3301-t0_firmware
𝑥
< 5.50\(aby.5.4\)c0
zyxeldx4510-b0_firmware
𝑥
< 5.17\(abyl.8\)c0
zyxeldx4510-b1_firmware
𝑥
< 5.17\(abyl.8\)c0
zyxeldx5401-b0_firmware
𝑥
< 5.17\(abyo.6.4\)c0
zyxeldx5401-b1_firmware
𝑥
< 5.17\(abyo.6.4\)c0
zyxelee6510-10_firmware
𝑥
< 5.19\(acjq.1\)c0
zyxelex2210-t0_firmware
𝑥
< 5.50\(acdi.2\)c0
zyxelex3300-t0_firmware
𝑥
< 5.50\(aby.5.4\)c0
zyxelex3300-t1_firmware
𝑥
< 5.50\(aby.5.4\)c0
zyxelex3301-t0_firmware
𝑥
< 5.50\(aby.5.4\)c0
zyxelex3500-t0_firmware
𝑥
< 5.44\(achr.3\)c0
zyxelex3501-t0_firmware
𝑥
< 5.44\(achr.3\)c0
zyxelex3510-b0_firmware
𝑥
< 5.17\(abup.13\)c0
zyxelex3510-b1_firmware
𝑥
< 5.17\(abup.13\)c0
zyxelex3600-t0_firmware
𝑥
< 5.70\(acif.0.4\)c0
zyxelex5401-b0_firmware
𝑥
< 5.17\(abyo.6.4\)c0
zyxelex5401-b1_firmware
𝑥
< 5.17\(abyo.6.4\)c0
zyxelex5501-b0_firmware
𝑥
< 5.17\(abry.5.3\)c0
zyxelex5510-b0_firmware
𝑥
< 5.17\(abqx.11\)c0
zyxelex5512-t0_firmware
𝑥
< 5.70\(aceg4.2\)c0
zyxelex5600-t1_firmware
𝑥
< 5.70\(acdz.3.4\)c0
zyxelex5601-t0_firmware
𝑥
< 5.70\(acdz.3.4\)c0
zyxelex5601-t1_firmware
𝑥
< 5.70\(acdz.3.4\)c0
zyxelex7501-b0_firmware
𝑥
< 5.18\(achn.1.3\)c0
zyxelex7710-b0_firmware
𝑥
< 5.18\(acak.1.1\)c0
zyxelemg3525-t50b_firmware
𝑥
< 5.50\(abpm.9.3\)c0
zyxelemg5523-t50b_firmware
𝑥
< 5.50\(abpm.9.3\)c0
zyxelemg5723-t50k_firmware
𝑥
< 5.50\(abom.8.5\)c0
zyxelemg6726-b10a_firmware
𝑥
< 5.13\(abnp.8\)c1
zyxelvmg3625-t50b_firmware
𝑥
< 5.50\(abpm.9.3\)c0
zyxelvmg3927-b50b_firmware
𝑥
< 5.13\(ably.9\)c1
zyxelvmg3927-t50k_firmware
𝑥
< 5.50\(abom.8.5\)c0
zyxelvmg4005-b50a_firmware
𝑥
< 5.15\(abqa.2.3\)c0
zyxelvmg4005-b60a_firmware
𝑥
< 5.15\(abqa.2.3\)c0
zyxelvmg4005-b50b_firmware
𝑥
< 5.13\(abrl.5.2\)c0
zyxelvmg4927-b50a_firmware
𝑥
< 5.13\(ably.9\)c1
zyxelvmg8623-t50b_firmware
𝑥
< 5.50\(abpm.9.3\)c0
zyxelvmg8825-t50k_firmware
𝑥
< 5.50\(abom.8.5\)c0
zyxelvmg8825-t50k_firmware
𝑥
< 5.50\(abpy.1\)b26
zyxelax7501-b0_firmware
𝑥
< 5.17\(abpc.5.3\)c0
zyxelax7501-b1_firmware
𝑥
< 5.17\(abpc.5.3\)c0
zyxelpm3100-t0_firmware
𝑥
< 5.42\(acbf.3\)c0
zyxelpm5100-t0_firmware
𝑥
< 5.42\(acbf.3\)c0
zyxelpm7300-t0_firmware
𝑥
< 5.42\(abyy.2.3\)c0
zyxelpm7500-t0_firmware
𝑥
< 5.61\(ackk.0.1\)c0
zyxelpx3321-t1_firmware
𝑥
< 5.44\(acjb.1.1\)c0
zyxelpx3321-t1_firmware
𝑥
< 5.44\(achk.0.3\)c0
zyxelpx5301-t0_firmware
𝑥
< 5.44\(ackb.0.1\)c0
zyxelwx3100-t0_firmware
𝑥
< 5.50\(abl.4.4\)c0
zyxelwx3401-b0_firmware
𝑥
< 5.17\(abe.2.6\)c0
zyxelwx3401-b1_firmware
𝑥
< 5.17\(abe.2.6\)c0
zyxelwx5600-t0_firmware
𝑥
< 5.70\(aceb.3.3\)c0
zyxelwx5610-b0_firmware
𝑥
< 5.18\(acgj0.1\)c0
𝑥
= Vulnerable software versions