Was? Das ist noch eine Meldung wert? Sollte es ernsthaft noch denkende Menschen geben, die #Zyxel einsetzen?
Was? Das ist noch eine Meldung wert? Sollte es ernsthaft noch denkende Menschen geben, die #Zyxel einsetzen?
We have identified some security vulnerabilities (CVE-2025-1731) in Zyxel USG FLEX H Series firewall appliances, that allow local users with access to a Linux OS shell to escalate privileges to root.
https://security.humanativaspa.it/local-privilege-escalation-on-zyxel-usg-flex-h-series-cve-2025-1731
#Zyxel #VulnerabilityResearch #CoordinatedDisclosure
So, one more switch arrived, the GS1900-24E, the non-#PoE variant of the #ZyXEL switch that I got before. And without PoE it was even about half the price on #Kleinanzeigen, just 35€. I wanted to have one that I could install at our hackspace, the #Nobreakspace, for production and one for development on #multicast.
This also means that things are getting more serious now, I think I have nearly all code changes/fixes now. Will need to clean them up a bit and submit pull requests then.
#zyxel
Der GS1200-5HP v2
ist Müll.
Frisch ausgepackt, Firmware update.
Softbrick.
Dabei jede Menge Hinweise auf Horror unter der Klappe gesehen.
Reading some of the online commentary about the whole #Zyxel fiasco, I had a very similar experience many years back. My team at work and I did a bunch of research time hacking on all kinds of settop media streaming pucks, and we found a ton of broken stuff (Multiple CVSS10.0s) and when we reported it responsibly the response was basically the same: "yeah that's old we won't fix it."
Apart from creating all the ewaste, it's kinda bullshit that companies can do that. Though I do wonder how hard it would be for the #Hacker community to patch this themselves.
Ich hab 'nen gemütlichen Abend auf dem Sofa mit @mikkas_world vom #SchenklRadio und zwei #Zyxel WiFi-Routern, von denen einer bereits ein #Freifunk-Knoten geworden ist.
#zyxel #security advisory for authentication bypass and command injection vulnerabilities in #NAS products
CVE-2023-35137 - improper authentication
CVE-2023-35138 - command injection
CVE-2023-37927 - improper neutralization of special elements
CVE-2023-37928 - post auth command injection
CVE-2023-4473 - command injection
CVE-2023-4474 - improper neutralization of special elements
Fortunately, Zyxel has released patches for these. Update to the latest #firmware.
#cybersecurity #infosec #cve #vulnerability
https://www.techspot.com/news/101025-zyxel-warns-users-against-new-critical-vulnerabilities-nas.html
You can write TI briefs about the #Zyxel Mirai thing now https://infosec.exchange/@shadowserver/110442626213838177
This is the media now so orgs can respond it’s part of why Mirai got flooded. #zyxel
This #Zyxel vuln is being mass exploited now by Mirai botnet, target = whole internet. #CVE202328771
Payload https://www.virustotal.com/gui/file/f962134b1486261f1a28831c6605e0e404c39e6e29f88e4b24ce6ed3a559795c
A fuck ton of SMB VPN boxes are owned. #threatintel
Lost my toot on it from last month, but I recommend you patch any #Zyxel Zywall devices for CVE-2023-28771 - it's super exploitable, pre-auth and facing to internet by design. #CVE202328771 #vulnerabilities
Exploit by @testanull