Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
None
Privileges Required
High
Attack Vector
Adjacent_network
0

CVE-2024-8881

Disclosure Date: November 12, 2024
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

A post-authentication command injection vulnerability in the CGI program in the Zyxel GS1900-48 switch firmware version V2.80(AAHN.1)C0 and earlier could allow an authenticated, LAN-based attacker with administrator privileges to execute some operating system (OS) commands on an affected device by sending a crafted HTTP request.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
6.8 Medium
Impact Score:
5.9
Exploitability Score:
0.9
Vector:
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack Vector (AV):
Adjacent_network
Attack Complexity (AC):
Low
Privileges Required (PR):
High
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
High
Integrity (I):
High
Availability (A):
High

General Information

Vendors

  • zyxel

Products

  • gs1900-10hp firmware,
  • gs1900-16 firmware,
  • gs1900-24 firmware,
  • gs1900-24e firmware,
  • gs1900-24ep firmware,
  • gs1900-24hpv2 firmware,
  • gs1900-48 firmware,
  • gs1900-48hpv2 firmware,
  • gs1900-8 firmware,
  • gs1900-8hp firmware

Additional Info

Technical Analysis