CVE-2022-0342
CRITICAL EXPLOITED NUCLEIZyxel USG/ZyWALL - Auth Bypass
Title source: llmDescription
An authentication bypass vulnerability in the CGI program of Zyxel USG/ZyWALL series firmware versions 4.20 through 4.70, USG FLEX series firmware versions 4.50 through 5.20, ATP series firmware versions 4.32 through 5.20, VPN series firmware versions 4.30 through 5.20, and NSG series firmware versions V1.20 through V1.33 Patch 4, which could allow an attacker to bypass the web authentication and obtain administrative access of the device.
Nuclei Templates (1)
Zyxel - Authentication Bypass
CRITICALVERIFIEDby SleepingBag945,Powerexploit
FOFA:
body="/2FA-access.cgi" && body="zyxel zyxel_style1" || body="/2fa-access.cgi" && body="zyxel zyxel_style1"
Scores
CVSS v3
9.8
EPSS
0.9236
EPSS Percentile
99.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2025-10-17
CWE
CWE-287
Status
published
Products (24)
zyxel/atp100_firmware
4.32 - 5.20
zyxel/atp100w_firmware
4.32 - 5.20
zyxel/atp200_firmware
4.32 - 5.20
zyxel/atp500_firmware
4.32 - 5.20
zyxel/atp700_firmware
4.32 - 5.20
zyxel/atp800_firmware
4.32 - 5.20
zyxel/nsg300_firmware
1.33 (2 CPE variants)
zyxel/nsg300_firmware
1.20 - 1.33
zyxel/usg40_firmware
4.20 - 4.71
zyxel/usg40w_firmware
4.20 - 4.71
... and 14 more
Published
Mar 28, 2022
Tracked Since
Feb 18, 2026