CVE-2023-33009
Plain English Summary
AI-powered analysis for quick understanding
An attacker can exploit a critical vulnerability in certain Zyxel device firmware to crash the device or potentially take control of it remotely, without needing to log in. This affects multiple firmware versions, so if your device is running one of these versions, it’s crucial to update it immediately to protect against this risk.
Technical Description
A buffer overflow vulnerability in the notification function in Zyxel ATP series firmware versions 4.60 through 5.36 Patch 1, USG FLEX series firmware versions 4.60 through 5.36 Patch 1, USG FLEX 50(W) firmware versions 4.60 through 5.36 Patch 1, USG20(W)-VPN firmware versions 4.60 through 5.36 Patch 1, VPN series firmware versions 4.60 through 5.36 Patch 1, ZyWALL/USG series firmware versions 4.60 through 4.73 Patch 1, could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and even a remote code execution on an affected device.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
May 24, 2023
almost 3 years ago
Last Modified
Feb 26, 2026
about 1 month ago
Vendor
zyxel
Product
atp100 firmware