CVE-2020-24355

9.8 CRITICAL

📋 TL;DR

This vulnerability in Zyxel VMG5313-B30B routers allows regular users to create new accounts with administrative privileges by manipulating JSON parameters during account creation. Attackers can exploit insecure permissions to gain full control of affected routers. This affects routers running firmware version 5.13(ABCJ.6)b3_1127 and possibly older versions.

💻 Affected Systems

Products:
  • Zyxel VMG5313-B30B router
Versions: Firmware 5.13(ABCJ.6)b3_1127 and possibly older versions
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user-level access to exploit; similar vulnerability may exist in account deletion functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of router with administrative access, enabling traffic interception, network pivoting, credential theft, and persistent backdoor installation.

🟠

Likely Case

Unauthorized administrative access leading to network surveillance, DNS hijacking, and credential harvesting from connected devices.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent lateral movement from compromised routers.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires existing user credentials; detailed technical analysis available in referenced blog posts.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Zyxel security advisories for latest patched firmware

Vendor Advisory: https://www.zyxel.com/support/security_advisories.shtml

Restart Required: Yes

Instructions:

1. Check current firmware version. 2. Download latest firmware from Zyxel support portal. 3. Upload firmware via router admin interface. 4. Apply update and restart router.

🔧 Temporary Workarounds

Disable remote management

all

Prevent external access to router administration interface

Restrict user account creation

all

Limit who can create new user accounts on the router

🧯 If You Can't Patch

  • Segment router management interface to isolated VLAN
  • Implement strict firewall rules limiting access to router administration ports

🔍 How to Verify

Check if Vulnerable:

Check firmware version via router admin interface; if version is 5.13(ABCJ.6)b3_1127 or older, assume vulnerable.

Check Version:

Login to router admin interface and check System Information or Firmware Status page

Verify Fix Applied:

Verify firmware version has been updated to patched version from Zyxel advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual user account creation events
  • Multiple failed login attempts followed by successful account creation
  • Administrative actions from non-admin user accounts

Network Indicators:

  • Unusual outbound connections from router
  • DNS configuration changes
  • Unexpected administrative traffic to router

SIEM Query:

source="router_logs" AND (event="user_created" OR event="privilege_escalation")

🔗 References

📤 Share & Export