Critical Security Flaw: Business Routers Exposed to OS Command Injection Attacks!

N-Ninja
3 Min Read

Several router models developed by⁢ the Taiwanese networking firm Zyxel have been found to contain a serious vulnerability, enabling threat actors to execute arbitrary​ commands remotely. ​The ⁣company has issued a critical ​patch ⁢to remediate‌ this ​security ‍flaw, and users are strongly urged to ⁣implement it without delay.

According ​to Zyxel’s advisory, the vulnerability arises⁣ from an “input validation error due ⁢to inadequate management ⁤of user-generated data.” Essentially, this means that the operating system fails to properly validate the information entered by users, which ​can lead⁤ hackers to exploit OS‌ command injection. This issue is ⁤designated as CVE-2024-7261, with an alarming severity rating of⁣ 9.8 out of 10—making it critical.

“The flawed handling of ‍special characters within the ‌‘host’ parameter in certain versions of CGI programming for‍ access points and security routers enables unauthorized individuals to run OS ⁤commands through a specially crafted cookie sent⁤ to compromised devices,” stated Zyxel in their ⁢announcement.

Significant Number of⁣ Devices at Risk

Many Zyxel access point models are susceptible due to this vulnerability. Below is an exhaustive list:

  • NWA Series: NWA50AX, NWA50AX ⁤PRO, NWA55AXE, NWA90AX, NWA90AX PRO,⁢ NWA110AX, NWA130BE, NWA210AX,​ NWA220AX-6E | all versions up until 7.00
  • NWA1123-AC PRO (all versions prior to 6.28)
  • NWA1123ACv3;​ WAC500; WAC500H (all ‌versions preceding ⁤6.70)
  • WAC Series: WAC6103D-I; WAC6502D-S; WAC6503D-S; WAC6552D-S; WAC6553D-E (all ⁣versions before 6.28)
  • WAX ⁤Series: WAX300H; WAX510D; WAX610D; WAX620D-6E; WAX630S; WAX640S-6E; WAX650S; ⁤WAX655E (all versions up until 7.00)
  • WBE Series: ⁢>WBE530 and‌ >WBE660S (versions ⁤prior to 7.00).

The USG‍ LITE 60 AX Security Router running firmware V2.00(ACIP .2) is also included⁢ among those vulnerable⁢ devices—it automatically receives ⁢updates so most users ⁣should⁤ be safeguarded‌ there but verifying⁣ that it runs on version ⁢V2 .00( ‍ACIP .3) is⁣ wise for ⁣additional assurance.

Zyxel holds a strong position in the ‍networking‍ industry ⁢with⁣ their‍ routers and switches widely adopted by enterprises globally—this makes them particularly appealing targets for cybercriminals who seek⁤ new vulnerabilities for exploitation purposes. Consequently, customers utilizing Zyxel ⁤products ‍must prioritize applying⁤ this patch promptly⁤ in order safeguard their⁤ systems effectively.

Via BleepingComputer

Additional Insights from TechRadar⁤ Pro

  • A‌ significant number ‌of D-Link NAS devices exhibit severe⁤ backdoor vulnerabilities
  • A curated selection ‌of⁣ top-notch​ firewalls ⁢currently available
  • An ​overview of leading endpoint security tools available today

Source

Share This Article
Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *