Zyxel security advisory for XSS vulnerability in NBG-418N v2 home router

Zyxel_May
Zyxel_May Posts: 121  Ally Member
First Anniversary First Comment

CVE: CVE-2022-45441

Summary

Zyxel has released a patch addressing a stored cross-site scripting (XSS) vulnerability in the NBG-418N v2 home router. Users are advised to install the patch for optimal protection.

What is the vulnerability?

An XSS vulnerability in Zyxel’s NBG-418N v2 could allow an unauthenticated attacker to store malicious scripts in the Logs page of the GUI on a vulnerable device. A successful XSS attack could then force a user to execute the stored malicious scripts when the user visits the Logs page of the GUI on the device.

What versions are vulnerable—and what should you do?

After a thorough investigation, we’ve identified only one vulnerable product that is within the vulnerability support period and released a firmware patch to address the issue, as shown in the table below.

Affected model

Affected version

Patch availability

NBG-418N v2

V1.00(AARP.10)C0 and earlier

V1.00(AARP.13)C0

Got a question?

Please contact your local service rep or visit Zyxel’s Community for further information or assistance.

Acknowledgment

Thanks to Mariusz Dalewski from MDDV for reporting the issue to us.

Revision history

2023-2-7: Initial release.