Zyxel, a prominent Taiwanese networking device manufacturer, has recently addressed serious security concerns in its firewall and access point products by rolling out patches for multiple vulnerabilities. The advisory from Zyxel highlighted four critical CVEs, each presenting unique risks, including remote code execution, command injection, and denial-of-service exploits. Notably, CVE-2023-6764 stands out for its potential to allow unauthorized remote code execution, albeit with a requirement for detailed knowledge of an affected device’s memory layout and configuration.
The vulnerabilities cover a range of issues, from null pointer dereference in firewall versions causing denial-of-service conditions to post-authentication command injection in file upload binaries, enabling attackers with administrator privileges to execute OS commands. Zyxel, a company with a history of grappling with software security problems, has emphasized the urgency of applying the released patches and hotfixes to mitigate the risks. The advisory also sheds light on the company’s acknowledgment of its devices being exploited in multiple DDoS-capable botnets, underscoring the broader implications of these vulnerabilities within the cybersecurity landscape.