Zyxel security advisory for DNS misconfiguration in NBG7510 home router
CVE: CVE-2022-38546
Summary
Zyxel has released a patch addressing a DNS misconfiguration in the NBG7510 home router. Users are advised to install the applicable update for optimal protection.
What is the vulnerability?
A DNS misconfiguration in Zyxel’s NBG7510 could allow an unauthenticated attacker to perform DNS-related attacks, such as DNS tunneling or DNS amplification attacks, by using the open DNS resolver when the device is switched to the AP mode.
What versions are vulnerable—and what should you do?
After a thorough investigation, we’ve identified only one vulnerable product that is within the vulnerability support period and released a firmware patch to address the issue, as shown in the table below.
Affected model |
Affected version |
Patch availability |
NBG7510 |
1.00(ABZY.2)C0 and earlier |
V1.00(ABZY.3)C0 |
Got a question?
Please contact your local service rep or visit Zyxel’s Community for further information or assistance.
Acknowledgment
Thanks to Alexander Traud for reporting the issue to us.
Revision history
2022-12-21: Initial release.
Categories
- All Categories
- 414 Beta Program
- 2.3K Nebula
- 132 Nebula Ideas
- 92 Nebula Status and Incidents
- 5.4K Security
- 180 USG FLEX H Series
- 258 Security Ideas
- 1.4K Switch
- 71 Switch Ideas
- 1K Wireless
- 37 Wireless Ideas
- 6.2K Consumer Product
- 236 Service & License
- 372 News and Release
- 79 Security Advisories
- 24 Education Center
- 5 [Campaign] Zyxel Network Detective
- 2.9K FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 80 About Community
- 69 Security Highlight