Vulnerability Details CVE-2023-22914
A path traversal vulnerability in the “account_print.cgi” CGI program of Zyxel USG FLEX series firmware versions 4.50 through 5.35, and VPN series firmware versions 4.30 through 5.35, which could allow a remote authenticated attacker with administrator privileges to execute unauthorized OS commands in the “tmp” directory by uploading a crafted file if the hotspot function were enabled.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.009
EPSS Ranking 74.8%
CVSS Severity
CVSS v3 Score 7.2
Products affected by CVE-2023-22914
-
cpe:2.3:h:zyxel:usg_flex_100:-
-
cpe:2.3:h:zyxel:usg_flex_100w:-
-
cpe:2.3:h:zyxel:usg_flex_200:-
-
cpe:2.3:h:zyxel:usg_flex_500:-
-
cpe:2.3:h:zyxel:usg_flex_50:-
-
cpe:2.3:h:zyxel:usg_flex_50w:-
-
cpe:2.3:h:zyxel:usg_flex_700:-
-
cpe:2.3:h:zyxel:vpn1000:-
-
-
-
-
cpe:2.3:o:zyxel:usg_flex_100_firmware:4.50
-
cpe:2.3:o:zyxel:usg_flex_100_firmware:4.60
-
cpe:2.3:o:zyxel:usg_flex_100_firmware:5.00
-
cpe:2.3:o:zyxel:usg_flex_100_firmware:5.01
-
cpe:2.3:o:zyxel:usg_flex_100_firmware:5.10
-
cpe:2.3:o:zyxel:usg_flex_100_firmware:5.20
-
cpe:2.3:o:zyxel:usg_flex_100_firmware:5.35
-
cpe:2.3:o:zyxel:usg_flex_100w_firmware:4.50
-
cpe:2.3:o:zyxel:usg_flex_100w_firmware:4.60
-
cpe:2.3:o:zyxel:usg_flex_100w_firmware:5.00
-
cpe:2.3:o:zyxel:usg_flex_100w_firmware:5.01
-
cpe:2.3:o:zyxel:usg_flex_100w_firmware:5.10
-
cpe:2.3:o:zyxel:usg_flex_100w_firmware:5.30
-
cpe:2.3:o:zyxel:usg_flex_100w_firmware:5.35
-
cpe:2.3:o:zyxel:usg_flex_200_firmware:4.50
-
cpe:2.3:o:zyxel:usg_flex_200_firmware:4.60
-
cpe:2.3:o:zyxel:usg_flex_200_firmware:5.00
-
cpe:2.3:o:zyxel:usg_flex_200_firmware:5.01
-
cpe:2.3:o:zyxel:usg_flex_200_firmware:5.20
-
cpe:2.3:o:zyxel:usg_flex_200_firmware:5.30
-
cpe:2.3:o:zyxel:usg_flex_200_firmware:5.35
-
cpe:2.3:o:zyxel:usg_flex_500_firmware:4.50
-
cpe:2.3:o:zyxel:usg_flex_500_firmware:4.60
-
cpe:2.3:o:zyxel:usg_flex_500_firmware:5.00
-
cpe:2.3:o:zyxel:usg_flex_500_firmware:5.01
-
cpe:2.3:o:zyxel:usg_flex_500_firmware:5.10
-
cpe:2.3:o:zyxel:usg_flex_500_firmware:5.20
-
cpe:2.3:o:zyxel:usg_flex_500_firmware:5.30
-
cpe:2.3:o:zyxel:usg_flex_500_firmware:5.35
-
cpe:2.3:o:zyxel:usg_flex_50_firmware:4.50
-
cpe:2.3:o:zyxel:usg_flex_50_firmware:4.60
-
cpe:2.3:o:zyxel:usg_flex_50_firmware:5.00
-
cpe:2.3:o:zyxel:usg_flex_50_firmware:5.10
-
cpe:2.3:o:zyxel:usg_flex_50_firmware:5.35
-
cpe:2.3:o:zyxel:usg_flex_50w_firmware:4.50
-
cpe:2.3:o:zyxel:usg_flex_50w_firmware:4.60
-
cpe:2.3:o:zyxel:usg_flex_50w_firmware:5.00
-
cpe:2.3:o:zyxel:usg_flex_50w_firmware:5.10
-
cpe:2.3:o:zyxel:usg_flex_50w_firmware:5.30
-
cpe:2.3:o:zyxel:usg_flex_50w_firmware:5.35
-
cpe:2.3:o:zyxel:usg_flex_700_firmware:4.50
-
cpe:2.3:o:zyxel:usg_flex_700_firmware:4.60
-
cpe:2.3:o:zyxel:usg_flex_700_firmware:5.00
-
cpe:2.3:o:zyxel:usg_flex_700_firmware:5.10
-
cpe:2.3:o:zyxel:usg_flex_700_firmware:5.20
-
cpe:2.3:o:zyxel:usg_flex_700_firmware:5.30
-
cpe:2.3:o:zyxel:usg_flex_700_firmware:5.35
-
cpe:2.3:o:zyxel:vpn1000_firmware:4.60
-
cpe:2.3:o:zyxel:vpn1000_firmware:5.20
-
cpe:2.3:o:zyxel:vpn1000_firmware:5.21
-
cpe:2.3:o:zyxel:vpn1000_firmware:5.30
-
cpe:2.3:o:zyxel:vpn100_firmware:4.60
-
cpe:2.3:o:zyxel:vpn100_firmware:5.20
-
cpe:2.3:o:zyxel:vpn100_firmware:5.21
-
cpe:2.3:o:zyxel:vpn100_firmware:5.30
-
cpe:2.3:o:zyxel:vpn300_firmware:4.60
-
cpe:2.3:o:zyxel:vpn300_firmware:5.20
-
cpe:2.3:o:zyxel:vpn300_firmware:5.21
-
cpe:2.3:o:zyxel:vpn300_firmware:5.30
-
cpe:2.3:o:zyxel:vpn50_firmware:4.60
-
cpe:2.3:o:zyxel:vpn50_firmware:5.20
-
cpe:2.3:o:zyxel:vpn50_firmware:5.21
-
cpe:2.3:o:zyxel:vpn50_firmware:5.30