CVE-2024-9197
📋 TL;DR
This is a post-authentication buffer overflow vulnerability in Zyxel VMG3625-T50B devices that allows authenticated administrators to cause temporary denial of service against the web management interface. Attackers need admin credentials and the ZyEE function must be enabled to exploit this vulnerability.
💻 Affected Systems
- Zyxel VMG3625-T50B
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Temporary DoS against web management interface, potentially disrupting administrative access and requiring physical reset.
Likely Case
Temporary service interruption of web management interface until device reboots or request stops.
If Mitigated
No impact if proper authentication controls and network segmentation are in place.
🎯 Exploit Status
Requires authenticated admin access and specific function enabled. Buffer overflow in CGI parameter handling.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Firmware newer than V5.50(ABPM.9.2)C0
Restart Required: Yes
Instructions:
1. Download latest firmware from Zyxel support portal. 2. Log into device web interface. 3. Navigate to Maintenance > Firmware Upgrade. 4. Upload and apply new firmware. 5. Device will reboot automatically.
🔧 Temporary Workarounds
Disable ZyEE Function
allDisable the ZyEE function if not required for device operation
Restrict Web Interface Access
allLimit access to web management interface to trusted IP addresses only
🧯 If You Can't Patch
- Disable ZyEE function in device configuration
- Implement strict network segmentation to isolate device management interface
🔍 How to Verify
Check if Vulnerable:
Check firmware version in web interface under Maintenance > System Info. If version is V5.50(ABPM.9.2)C0 or earlier, device is vulnerable.
Check Version:
Check via web interface or SSH: show version
Verify Fix Applied:
Verify firmware version is newer than V5.50(ABPM.9.2)C0 after patching.
📡 Detection & Monitoring
Log Indicators:
- Multiple failed authentication attempts followed by HTTP GET requests with long 'action' parameters
- Web interface crash/restart logs
Network Indicators:
- HTTP GET requests with unusually long 'action' parameter values to CGI endpoints
SIEM Query:
source="device_logs" AND (http_method="GET" AND url="*cgi*" AND param_action_length>100)