Description

A post-authentication buffer overflow vulnerability in the parameter "action" of the CGI program in Zyxel VMG3625-T50B firmware versions through V5.50(ABPM.9.2)C0 could allow an authenticated attacker with administrator privileges to cause a temporary denial of service (DoS) condition against the web management interface by sending a crafted HTTP GET request to a vulnerable device if the function ZyEE is enabled.

INFO

Published Date :

2024-12-03T01:24:36.983Z

Last Modified :

2024-12-03T16:48:00.520Z

Source :

Zyxel
AFFECTED PRODUCTS

The following products are affected by CVE-2024-9197 vulnerability.

Vendors Products
Zyxel
  • Ax7501-b0
  • Ax7501-b0 Firmware
  • Ax7501-b1
  • Ax7501-b1 Firmware
  • Dx3300-t0
  • Dx3300-t0 Firmware
  • Dx3300-t1
  • Dx3300-t1 Firmware
  • Dx3301-t0
  • Dx3301-t0 Firmware
  • Dx4510-b0
  • Dx4510-b0 Firmware
  • Dx4510-b1
  • Dx4510-b1 Firmware
  • Dx5401-b0
  • Dx5401-b0 Firmware
  • Dx5401-b1
  • Dx5401-b1 Firmware
  • Ee6510-10
  • Ee6510-10 Firmware
  • Emg3525-t50b
  • Emg3525-t50b Firmware
  • Emg5523-t50b
  • Emg5523-t50b Firmware
  • Emg5723-t50k
  • Emg5723-t50k Firmware
  • Ex3300-t0
  • Ex3300-t0 Firmware
  • Ex3300-t1
  • Ex3300-t1 Firmware
  • Ex3301-t0
  • Ex3301-t0 Firmware
  • Ex3500-t0
  • Ex3500-t0 Firmware
  • Ex3501-t0
  • Ex3501-t0 Firmware
  • Ex3510-b0
  • Ex3510-b0 Firmware
  • Ex3510-b1
  • Ex3510-b1 Firmware
  • Ex3600-t0
  • Ex3600-t0 Firmware
  • Ex5401-b0
  • Ex5401-b0 Firmware
  • Ex5401-b1
  • Ex5401-b1 Firmware
  • Ex5501-b0
  • Ex5501-b0 Firmware
  • Ex5510-b0
  • Ex5510-b0 Firmware
  • Ex5600-t1
  • Ex5600-t1 Firmware
  • Ex5601-t0
  • Ex5601-t0 Firmware
  • Ex5601-t1
  • Ex5601-t1 Firmware
  • Ex7501-b0
  • Ex7501-b0 Firmware
  • Px3321-t1
  • Px3321-t1 Firmware
  • Px5301-t0
  • Px5301-t0 Firmware
  • Vmg3625-t50b
  • Vmg3625-t50b Firmware
  • Vmg3927-t50k
  • Vmg3927-t50k Firmware
  • Vmg8623-t50b
  • Vmg8623-t50b Firmware
  • Vmg8825-t50k
  • Vmg8825-t50k Firmware
  • Wx5600-t0
  • Wx5600-t0 Firmware

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact