CVE-2023-34139

8.8 HIGH

📋 TL;DR

An unauthenticated command injection vulnerability in the Free Time WiFi hotspot feature of Zyxel USG FLEX and VPN series firewalls allows LAN-based attackers to execute arbitrary operating system commands on affected devices. This affects firmware versions 4.50 through 5.36 Patch 2 for USG FLEX series and 4.20 through 5.36 Patch 2 for VPN series. Attackers can potentially gain full control of the firewall device.

💻 Affected Systems

Products:
  • Zyxel USG FLEX series
  • Zyxel VPN series
Versions: USG FLEX: 4.50 through 5.36 Patch 2, VPN: 4.20 through 5.36 Patch 2
Operating Systems: Zyxel proprietary firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Free Time WiFi hotspot feature to be enabled. Vulnerability is LAN-based only, not exploitable from WAN interfaces.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attacker to reconfigure firewall rules, intercept network traffic, install persistent backdoors, pivot to internal networks, and potentially brick the device.

🟠

Likely Case

Attacker gains shell access to execute commands, modifies firewall configurations, steals credentials, and establishes persistence on the network perimeter.

🟢

If Mitigated

Limited impact if device is patched, network segmentation prevents lateral movement, and proper monitoring detects exploitation attempts.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires LAN access but no authentication. Attack complexity is low once the vulnerability details are understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.36 Patch 3 or later

Vendor Advisory: https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-wlan-controllers

Restart Required: Yes

Instructions:

1. Log into Zyxel firewall web interface. 2. Navigate to Maintenance > Firmware. 3. Upload firmware version 5.36 Patch 3 or later. 4. Apply the firmware update. 5. Reboot the device.

🔧 Temporary Workarounds

Disable Free Time WiFi Hotspot

all

Disable the vulnerable Free Time WiFi hotspot feature if not required.

Navigate to Configuration > Object > Service > Free Time WiFi and disable the feature

Network Segmentation

all

Isolate the firewall management interface to a dedicated VLAN with strict access controls.

🧯 If You Can't Patch

  • Disable Free Time WiFi hotspot feature immediately
  • Implement strict network access controls to limit LAN access to firewall management interfaces

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface: System > Status > Firmware Version. If version is between affected ranges and Free Time WiFi is enabled, device is vulnerable.

Check Version:

Show version via CLI or check System > Status > Firmware Version in web interface

Verify Fix Applied:

Verify firmware version is 5.36 Patch 3 or later and confirm Free Time WiFi feature status.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Unexpected configuration changes
  • Authentication attempts from unexpected sources

Network Indicators:

  • Unusual outbound connections from firewall device
  • Traffic patterns inconsistent with normal operations

SIEM Query:

source="zyxel-firewall" AND (event_type="command_execution" OR config_change="unauthorized")

🔗 References

📤 Share & Export