CVE-2023-33009

Critical
|9.8
Exploit Available

Plain English Summary

AI-powered analysis for quick understanding

An attacker can exploit a critical vulnerability in certain Zyxel device firmware to crash the device or potentially take control of it remotely, without needing to log in. This affects multiple firmware versions, so if your device is running one of these versions, it’s crucial to update it immediately to protect against this risk.

Technical Description

A buffer overflow vulnerability in the notification function in Zyxel ATP series firmware versions 4.60 through 5.36 Patch 1, USG FLEX series firmware versions 4.60 through 5.36 Patch 1, USG FLEX 50(W) firmware versions 4.60 through 5.36 Patch 1, USG20(W)-VPN firmware versions 4.60 through 5.36 Patch 1, VPN series firmware versions 4.60 through 5.36 Patch 1, ZyWALL/USG series firmware versions 4.60 through 4.73 Patch 1, could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and even a remote code execution on an affected device.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$13,000($5K-$15K)
Vendor Response
Grade FPatched in 1009 days

Quick Information

Published

May 24, 2023

almost 3 years ago

Last Modified

Feb 26, 2026

about 1 month ago

Vendor

zyxel

Product

atp100 firmware