Through an undocumented sequence of keypresses, undocumented functionality is triggered. The menu is believed to be accessible using a serial console.Īn issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. The access control check for this menu does work and prohibits accessing the menu, which contains "Password recovery for specific user" options. Specifically, a menu can be triggered by sending the SIGQUIT signal to the CLI application (e.g., through CTRL \ via SSH). By sending a signal to the CLI process, undocumented functionality is triggered. A vulnerability in the 'libsal.so' of the Zyxel GS1900 series firmware version 2.60 could allow an authenticated local user to execute arbitrary OS commands via a crafted function call.Ī vulnerability in the TFTP client of Zyxel GS1900 series firmware, XGS1210 series firmware, and XGS1250 series firmware, which could allow an authenticated LAN user to execute arbitrary OS commands via the GUI of the vulnerable device.Ī vulnerability was found in the CGI program in Zyxel GS1900-8 firmware version V2.60, that did not properly sterilize packet contents and could allow an authenticated, local user to perform a cross-site scripting (XSS) attack via a crafted LLDP packet.Īn issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0.
0 Comments
Leave a Reply. |