Zyxel Patches Critical OS Command Injection Flaw in Access Points and Routers

Zyxel Patches Critical OS Command Injection Flaw in Access Points and Routers

September 4, 2024 at 08:31AM

Zyxel has released software updates to address a critical security flaw (CVE-2024-7261) affecting some access points and security routers, along with updates for seven other vulnerabilities. The flaws could result in unauthorized command execution, denial-of-service, or access to browser-based information. D-Link has announced that certain security vulnerabilities will not be patched due to end-of-life status.

From the meeting notes:

– Zyxel has released software updates to address a critical security flaw (CVE-2024-7261) impacting certain access point (AP) and security router versions, allowing unauthorized command execution due to OS command injection.

– Updates have been shipped for seven vulnerabilities in Zyxel routers and firewalls, including high severity issues such as buffer overflow, command injection, and null pointer dereference vulnerabilities.

– D-Link has confirmed that four security vulnerabilities affecting its DIR-846 router, including two critical remote command execution vulnerabilities, will not be patched due to end-of-life status, urging customers to replace them with supported versions.

Is there anything else you would like me to include or focus on in the meeting notes?

Full Article