CVE-2024-7261

9.8 CRITICAL

📋 TL;DR

This is an unauthenticated OS command injection vulnerability in Zyxel networking devices that allows remote attackers to execute arbitrary commands on affected systems. Attackers can exploit it by sending specially crafted cookies to vulnerable CGI programs. Organizations using affected Zyxel access points and security routers are at risk.

💻 Affected Systems

Products:
  • Zyxel NWA1123ACv3
  • Zyxel WAC500
  • Zyxel WAX655E
  • Zyxel WBE530
  • Zyxel USG LITE 60AX
Versions: NWA1123ACv3: 6.70(ABVT.4) and earlier, WAC500: 6.70(ABVS.4) and earlier, WAX655E: 7.00(ACDO.1) and earlier, WBE530: 7.00(ACLE.1) and earlier, USG LITE 60AX: V2.00(ACIP.2) and earlier
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise leading to network infiltration, data exfiltration, ransomware deployment, and use as pivot point for lateral movement.

🟠

Likely Case

Device takeover enabling network reconnaissance, credential harvesting, and installation of persistent backdoors.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict ingress filtering and network segmentation.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation with CVSS 9.8 score indicates critical risk for internet-exposed devices.
🏢 Internal Only: MEDIUM - Still significant risk from internal threats or compromised hosts, but attack surface is reduced.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Unauthenticated exploitation with simple HTTP request manipulation makes this easily weaponizable. Public exploit code may emerge soon.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific fixed versions per product

Vendor Advisory: https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-os-command-injection-vulnerability-in-aps-and-security-router-devices-09-03-2024

Restart Required: Yes

Instructions:

1. Visit Zyxel support portal 2. Download latest firmware for your specific model 3. Backup current configuration 4. Upload firmware via web interface 5. Apply update 6. Reboot device 7. Verify version

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected devices in separate VLANs with strict firewall rules

Access Control

all

Restrict management interface access to trusted IP addresses only

🧯 If You Can't Patch

  • Immediately isolate affected devices from internet and critical network segments
  • Implement strict network monitoring and alerting for suspicious HTTP requests to CGI endpoints

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface or CLI against affected versions list

Check Version:

Login to device web interface and check System Information or use CLI command 'show version'

Verify Fix Applied:

Verify firmware version is newer than affected versions listed in vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests to CGI endpoints
  • Multiple failed login attempts followed by successful access
  • Commands in HTTP cookie parameters

Network Indicators:

  • HTTP requests with suspicious cookie values containing shell metacharacters
  • Outbound connections from networking devices to unexpected destinations

SIEM Query:

source="firewall_logs" AND (uri="*.cgi" OR uri="*.cgi?*") AND (cookie CONTAINS "|" OR cookie CONTAINS ";" OR cookie CONTAINS "`" OR cookie CONTAINS "$")

🔗 References

📤 Share & Export