Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-29972 PoC — Zyxel NAS326和Zyxel NAS542 操作系统命令注入漏洞

Source
Associated Vulnerability
Title:Zyxel NAS326和Zyxel NAS542 操作系统命令注入漏洞 (CVE-2024-29972)
Description:** UNSUPPORTED WHEN ASSIGNED ** The command injection vulnerability in the CGI program "remote_help-cgi" in Zyxel NAS326 firmware versions before V5.21(AAZF.17)C0 and NAS542 firmware versions before V5.21(ABAG.14)C0 could allow an unauthenticated attacker to execute some operating system (OS) commands by sending a crafted HTTP POST request.
Readme
# TG Join Us https://t.me/WanLiChangChengWanLiChang
加入我们定时查收各类漏洞 EXP POC

# CVE-2024-29972-EXP
CVE-2024-29972 Zyxel Nas Backdoor Account 后门账户未授权开启

# FOFA
app="ZyXEL-NAS326"

# 注意事项 
该EXP利用脚本 系CVE-2024-29972与29973的结合利用 你也可以称为组合拳
后门账户 NsaRescueAngel 拥有Root 权限
File Snapshot

[4.0K] /data/pocs/2c4b3a38d08fc8fe224facda69385a4f8da03eb7 ├── [2.6K] CVE-2024-29972.py └── [ 367] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →