A vulnerability in specific versions of Zyxel NBG6818, NBG7815, WSQ20, WSQ50, WSQ60, and WSR30 firmware with pre-configured password management could allow an attacker to obtain root access of the device, if the local attacker dismantles the device and uses a USB-to-UART cable to connect the device, or if the remote assistance feature had been enabled by an authenticated user.
References
Link | Resource |
---|---|
https://www.zyxel.com/support/Zyxel_security_advisory_for_pre-configured_password_management_vulnerability_of_home_routers_and_WiFi_systems.shtml | Vendor Advisory |
https://www.tenable.com/security/research/tra-2022-06 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Information
Published : 2021-11-23 14:15
Updated : 2022-10-27 09:59
NVD link : CVE-2021-35033
Mitre link : CVE-2021-35033
JSON object : View
CWE
CWE-287
Improper Authentication
Products Affected
zyxel
- wsq20_firmware
- wsq60
- nbg6818
- wsr30
- wsq50_firmware
- wsq20
- nbg7815
- wsq50
- wsr30_firmware
- wsq60_firmware
- nbg6818_firmware
- nbg7815_firmware