Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-33010

CVSS 9.8 · Critical KEV EPSS 5.85% · P91
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-33010

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A buffer overflow vulnerability in the ID processing function in Zyxel ATP series firmware versions 4.32 through 5.36 Patch 1, USG FLEX series firmware versions 4.50 through 5.36 Patch 1, USG FLEX 50(W) firmware versions 4.25 through 5.36 Patch 1, USG20(W)-VPN firmware versions 4.25 through 5.36 Patch 1, VPN series firmware versions 4.30 through 5.36 Patch 1, ZyWALL/USG series firmware versions 4.25 through 4.73 Patch 1, could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and even a remote code execution on an affected device.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
未进行输入大小检查的缓冲区拷贝(传统缓冲区溢出)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Zyxel ATP 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Zyxel ATP是中国合勤(Zyxel)公司的一款防火墙。 Zyxel ATP V4.32版本至V5.36 Patch 1版本存在安全漏洞,该漏洞源于存在缓冲区溢出漏洞,可能允许未经身份验证的攻击者造成拒绝服务(DoS),甚至在受影响的设备上远程执行代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
ZyxelATP series firmware 4.32 through 5.36 Patch 1 -
ZyxelUSG FLEX series firmware 4.50 through 5.36 Patch 1 -
ZyxelUSG FLEX 50(W) firmware 4.25 through 5.36 Patch 1 -
ZyxelUSG20(W)-VPN firmware 4.25 through 5.36 Patch 1 -
ZyxelVPN series firmware 4.30 through 5.36 Patch 1 -
ZyxelZyWALL/USG series firmware 4.25 through 4.73 Patch 1 -

II. Public POCs for CVE-2023-33010

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-33010

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2023-33010

No comments yet


Leave a comment