CVE-2020-25014
Severity CVSS v4.0:
Pending analysis
Type:
CWE-787
Out-of-bounds Write
Publication date:
27/11/2020
Last modified:
12/12/2024
Description
A stack-based buffer overflow in fbwifi_continue.cgi on Zyxel UTM and VPN series of gateways running firmware version V4.30 through to V4.55 allows remote unauthenticated attackers to execute arbitrary code via a crafted http packet.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:* | 4.30 (including) | 4.55 (including) |
| cpe:2.3:h:zyxel:zywall_110:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:* | 4.30 (including) | 4.55 (including) |
| cpe:2.3:h:zyxel:zywall_1100:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:* | 4.30 (including) | 4.55 (including) |
| cpe:2.3:h:zyxel:zywall_310:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:* | 4.30 (including) | 4.55 (including) |
| cpe:2.3:h:zyxel:usg_110:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:* | 4.30 (including) | 4.55 (including) |
| cpe:2.3:h:zyxel:usg_1100:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:* | 4.30 (including) | 4.55 (including) |
| cpe:2.3:h:zyxel:usg_1900:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:* | 4.30 (including) | 4.55 (including) |
| cpe:2.3:h:zyxel:usg_20w:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:* | 4.30 (including) | 4.55 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://businessforum.zyxel.com/categories/security-news-and-release
- https://www.zyxel.com/support/Zyxel-security-advisory-for-buffer-overflow-vulnerability.shtml
- https://businessforum.zyxel.com/categories/security-news-and-release
- https://www.zyxel.com/support/Zyxel-security-advisory-for-buffer-overflow-vulnerability.shtml



