Zyxel security advisory for post-authentication command injection in NTP feature of NBG6604...
Zyxel security advisory for post-authentication command injection in NTP feature of NBG6604 home router
CVE: CVE-2023-33013
Summary
Zyxel has released a patch addressing a post-authentication command injection vulnerability in the Network Time Protocol (NTP) feature of the NBG6604 home router. Users are advised to install the patch for optimal protection.
What is the vulnerability?
A post-authentication command injection vulnerability in the NTP feature of Zyxel's NBG6604 could allow an authenticated attacker to execute some OS commands remotely by sending a crafted HTTP request. Note that WAN access is disabled by default on the home router.
What versions are vulnerable—and what should you do?
After a thorough investigation, we’ve identified only one vulnerable product that is within the vulnerability support period and released a firmware patch to address the issue, as shown in the table below.
Affected model | Affected version | Patch availability |
---|---|---|
NBG6604 | V1.01(ABIR.1)C0 |
Got a question?
Please contact your local service rep or visit Zyxel’s Community for further information or assistance.
Acknowledgment
Thanks to Jincheng Wang from X1cT34m Laboratory of Nanjing University of Posts and Telecommunications for reporting the issue to us.
Revision history
2023-8-15: Initial release.
Categories
- All Categories
- 397 Beta Program
- 2.1K Nebula
- 117 Nebula Ideas
- 81 Nebula Status and Incidents
- 5.1K Security
- 91 USG FLEX H Series
- 247 Security Ideas
- 1.3K Switch
- 69 Switch Ideas
- 920 WirelessLAN
- 35 WLAN Ideas
- 5.9K Consumer Product
- 210 Service & License
- 337 News and Release
- 71 Security Advisories
- 21 Education Center
- 5 [Campaign] Zyxel Network Detective
- 2K FAQ
- 931 Nebula FAQ
- 423 Security FAQ
- 238 Switch FAQ
- 210 WirelessLAN FAQ
- 47 Consumer Product FAQ
- 139 Service & License FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 72 About Community
- 62 Security Highlight