Home

Description

A post-authentication buffer overflow vulnerability in the parameter "action" of the CGI program in Zyxel VMG3625-T50B firmware versions through V5.50(ABPM.9.2)C0 could allow an authenticated attacker with administrator privileges to cause a temporary denial of service (DoS) condition against the web management interface by sending a crafted HTTP GET request to a vulnerable device if the function ZyEE is enabled.

PUBLISHED Reserved 2024-09-26 | Published 2024-12-03 | Updated 2024-12-03 | Assigner Zyxel




MEDIUM: 4.9CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

Product status

Default status
unaffected

<= V5.50(ABPM.9.2)C0
affected

References

www.zyxel.com/...pe-fiber-onts-and-wifi-extenders-12-03-2024 vendor-advisory

cve.org (CVE-2024-9197)

nvd.nist.gov (CVE-2024-9197)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.