CVE-2022-30525

CRITICAL KEV RANSOMWARE NUCLEI

Zyxel Firewall SUID Binary Privilege Escalation

Title source: metasploit

Description

A OS command injection vulnerability in the CGI program of Zyxel USG FLEX 100(W) firmware versions 5.00 through 5.21 Patch 1, USG FLEX 200 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 500 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 700 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 50(W) firmware versions 5.10 through 5.21 Patch 1, USG20(W)-VPN firmware versions 5.10 through 5.21 Patch 1, ATP series firmware versions 5.10 through 5.21 Patch 1, VPN series firmware versions 4.60 through 5.21 Patch 1, which could allow an attacker to modify specific files and then execute some OS commands on a vulnerable device.

Exploits (17)

exploitdb WORKING POC
by Valentin Lobstein · textremotehardware
https://www.exploit-db.com/exploits/50946
nomisec WORKING POC 33 stars
by shuai06 · remote
https://github.com/shuai06/CVE-2022-30525
nomisec WORKING POC 30 stars
by jbaines-r7 · remote
https://github.com/jbaines-r7/victorian_machinery
nomisec WORKING POC 22 stars
by Henry4E36 · poc
https://github.com/Henry4E36/CVE-2022-30525
nomisec WORKING POC 12 stars
by west9b · poc
https://github.com/west9b/CVE-2022-30525
nomisec WORKING POC 4 stars
by savior-only · poc
https://github.com/savior-only/CVE-2022-30525
nomisec WORKING POC 3 stars
by iveresk · remote
https://github.com/iveresk/cve-2022-30525
nomisec WORKING POC 3 stars
by k0sf · poc
https://github.com/k0sf/CVE-2022-30525
nomisec SCANNER 2 stars
by cbk914 · poc
https://github.com/cbk914/CVE-2022-30525_check
nomisec WORKING POC 2 stars
by Chocapikk · poc
https://github.com/Chocapikk/CVE-2022-30525-Reverse-Shell
nomisec WORKING POC 1 stars
by ProngedFork · poc
https://github.com/ProngedFork/CVE-2022-30525
nomisec WRITEUP 1 stars
by furkanzengin · poc
https://github.com/furkanzengin/CVE-2022-30525
nomisec WORKING POC 1 stars
by superzerosec · remote
https://github.com/superzerosec/CVE-2022-30525
nomisec WORKING POC
by arajsingh-infosec · remote
https://github.com/arajsingh-infosec/CVE-2022-30525_Exploit
nomisec WORKING POC
by M4fiaB0y · poc
https://github.com/M4fiaB0y/CVE-2022-30525
metasploit WORKING POC EXCELLENT
by jbaines-r7 · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/zyxel_ztp_rce.rb

Nuclei Templates (1)

Zyxel Firewall - OS Command Injection
CRITICALby h1ei1,prajiteshsingh
Shodan: title:"USG FLEX 100","USG FLEX 100w","USG FLEX 200","USG FLEX 500","USG FLEX 700","USG FLEX 50","USG FLEX 50w","ATP100","ATP200","ATP500","ATP700" || http.title:"usg flex 100","usg flex 100w","usg flex 200","usg flex 500","usg flex 700","usg flex 50","usg flex 50w","atp100","atp200","atp500","atp700"

Scores

CVSS v3 9.8
EPSS 0.9445
EPSS Percentile 100.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CISA KEV 2022-05-16
VulnCheck KEV 2022-05-14
InTheWild.io 2022-05-13
ENISA EUVD EUVD-2022-52385
Ransomware Use Confirmed
CWE
CWE-78
Status published
Products (16)
zyxel/atp100_firmware 5.10 - 5.30
zyxel/atp100w_firmware 5.10 - 5.30
zyxel/atp200_firmware 5.10 - 5.30
zyxel/atp500_firmware 5.10 - 5.30
zyxel/atp700_firmware 5.10 - 5.30
zyxel/atp800_firmware 5.10 - 5.30
zyxel/usg20w-vpn_firmware 5.10 - 5.30
zyxel/usg_flex_100w_firmware 5.00 - 5.30
zyxel/usg_flex_200_firmware 5.00 - 5.30
zyxel/usg_flex_500_firmware 5.00 - 5.30
... and 6 more
Published May 12, 2022
KEV Added May 16, 2022
Tracked Since Feb 18, 2026