Article Details
Scrape Timestamp (UTC): 2024-09-04 11:35:56.212
Source: https://thehackernews.com/2024/09/zyxel-patches-critical-os-command.html
Original Article Text
Click to Toggle View
Zyxel Patches Critical OS Command Injection Flaw in Access Points and Routers. Zyxel has released software updates to address a critical security flaw impacting certain access point (AP) and security router versions that could result in the execution of unauthorized commands. Tracked as CVE-2024-7261 (CVSS score: 9.8), the vulnerability has been described as a case of operating system (OS) command injection. "The improper neutralization of special elements in the parameter 'host' in the CGI program of some AP and security router versions could allow an unauthenticated attacker to execute OS commands by sending a crafted cookie to a vulnerable device," Zyxel said in an advisory. Chengchao Ai from the ROIS team of Fuzhou University has been credited with discovering and reporting the flaw. Zyxel has also shipped updates for seven vulnerabilities in its routers and firewalls, including few that are high in severity, that could result in OS command execution, a denial-of-service (DoS), or access browser-based information - The development comes as D-Link said four security vulnerabilities affecting its DIR-846 router, counting two critical remote command execution vulnerabilities (CVE-2024-44342, CVSS score: 9.8) will not be patched owing to the products reaching end-of-life (EoL) status of February 2020, urging customers to replace them with support versions.
Daily Brief Summary
Zyxel has issued updates for a critical OS command injection flaw in some of its access points and routers.
The vulnerability, identified as CVE-2024-7261 with a CVSS score of 9.8, allows execution of unauthorized commands through a crafted cookie.
Attackers can exploit the flaw without authentication, potentially taking control of the affected devices.
The flaw was discovered by Chengchao Ai from the ROIS team at Fuzhou University.
Alongside this critical flaw, Zyxel has also patched seven other vulnerabilities that could lead to OS command execution, DoS attacks, or compromise browser-based information.
In related news, D-Link announced it will not patch four vulnerabilities, including two critical ones, in its DIR-846 router due to the product reaching its end-of-life status in February 2020.