Close Menu
NotesleuNotesleu
    Facebook X (Twitter) Instagram
    NotesleuNotesleu
    • Home
    • General News
    • Cyber Attacks
    • Threats
    • Vulnerabilities
    • Cybersecurity
    • Contact Us
    • More
      • About US
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
    NotesleuNotesleu
    Home»Vulnerabilities»Zyxel Addresses 15 Security Vulnerabilities Across NAS, Firewall, and AP Devices with Latest Patches

    Zyxel Addresses 15 Security Vulnerabilities Across NAS, Firewall, and AP Devices with Latest Patches

    By NotesleuNo Comments2 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Reddit Copy Link

    Zyxel has taken swift action to rectify 15 security vulnerabilities affecting a range of devices, including network-attached storage (NAS), firewalls, and access points (APs). Among these vulnerabilities, three critical flaws posed significant risks, enabling potential attackers to bypass authentication and execute command injections.

    The specific vulnerabilities are detailed as follows:

    1. CVE-2023-35138 (CVSS score: 9.8) – A critical command injection vulnerability that permits unauthenticated attackers to execute operating system commands through a carefully crafted HTTP POST request.
    2. CVE-2023-4473 (CVSS score: 9.8) – A critical command injection vulnerability within the web server, allowing unauthenticated attackers to execute operating system commands via a manipulated URL directed at a vulnerable device.
    3. CVE-2023-4474 (CVSS score: 9.8) – An imperative improper neutralization of special elements vulnerability enabling unauthenticated attackers to execute operating system commands through a specifically crafted URL.

    Zyxel has also addressed three high-severity flaws (CVE-2023-35137, CVE-2023-37927, and CVE-2023-37928). Exploiting these vulnerabilities could potentially grant attackers access to system information and the ability to execute arbitrary commands. It’s noteworthy that CVE-2023-37927 and CVE-2023-37928 require authentication for successful exploitation.

    The impacted models and versions include:

    • NAS326: Versions V5.21(AAZF.14)C0 and earlier (Patched in V5.21(AAZF.15)C0)
    • NAS542: Versions V5.21(ABAG.11)C0 and earlier (Patched in V5.21(ABAG.12)C0)

    This comprehensive advisory follows closely on the heels of Zyxel’s recent fixes for nine vulnerabilities in specific firewall and access point versions. Some of these could potentially be weaponized to gain unauthorized access to system files and administrator logs, or even trigger a denial-of-service (DoS) condition.

    Given the historical exploitation of Zyxel devices by threat actors, users are strongly urged to promptly apply the latest updates to fortify their systems against potential security threats.

    Found this news interesting? Follow us on Twitter  and Telegram to read more exclusive content we post.

    Post Views: 57
    Featured
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleHow Hackers Phish for Your Users’ Credentials and Sell Them
    Next Article Qilin Ransomware’s Latest Variant Targets VMware ESXi Servers with Advanced Linux Encryptor

    Related Posts

    Cyber Attacks December 26, 2025

    2 Million Affected by SQL Injection and XSS Data Breach

    December 26, 2025
    Tech December 26, 2025

    “I Had a Dream” and Generative AI Jailbreaks

    December 26, 2025
    AI December 26, 2025

    Microsoft Unveils Security Copilot Early Access Program, Revolutionizing Threat Response

    December 26, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    About Us
    About Us

    We're your premier source for the latest in AI, cybersecurity, science, and technology. Dedicated to providing clear, thorough, and accurate information, our team brings you insights into the innovations that shape tomorrow. Let's navigate the future together."

    Popular Post

    Complete HTML Handwritten Notes

    NKAbuse Malware Exploits NKN Blockchain for Advanced DDoS Attacks

    Advanced Python Mastery: For the Serious Developer

    Complete C++ Handwritten Notes From Basic to Advanced

    Google Introduces New Features Empowering Users to Manage Online Information

    © 2025 Notesleu. Designed by NIM.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.