CVE-2024-29973
CRITICAL EXPLOITED IN THE WILD NUCLEIZyxel NAS326 <V5.21(AAZF.17)C0 - Command Injection
Title source: llmDescription
** UNSUPPORTED WHEN ASSIGNED ** The command injection vulnerability in the “setCookie” parameter in Zyxel NAS326 firmware versions before V5.21(AAZF.17)C0 and NAS542 firmware versions before V5.21(ABAG.14)C0 could allow an unauthenticated attacker to execute some operating system (OS) commands by sending a crafted HTTP POST request.
Exploits (11)
github
WORKING POC
40 stars
by iSee857 · pythonpoc
https://github.com/iSee857/CVE-PoC/tree/main/Zyxel_CVE-2024-29973_setCookie_RCE.py
nomisec
WORKING POC
6 stars
by RevoltSecurities · remote
https://github.com/RevoltSecurities/CVE-2024-29973
github
WORKING POC
4 stars
by Pommaq · pythonremote
https://github.com/Pommaq/CVE-2024-29972-CVE-2024-29976-CVE-2024-29973-CVE-2024-29975-CVE-2024-29974-poc
Nuclei Templates (1)
Zyxel NAS326 Firmware < V5.21(AAZF.17)C0 - Command Injection
CRITICALVERIFIEDby ritikchaddha
FOFA:
app="ZYXEL-NAS326"
Scores
CVSS v3
9.8
EPSS
0.9405
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2024-06-24
InTheWild.io
2024-09-18
CWE
CWE-78
Status
published
Products (2)
zyxel/nas326_firmware
< 5.21\(aazf.17\)c0
zyxel/nas542_firmware
< 5.21\(abag.14\)c0
Published
Jun 04, 2024
Tracked Since
Feb 18, 2026