Wednesday, May 28, 2025
HomeCVE/vulnerabilityZyxel Format String Flaw Let Attackers Execute Unauthorized Remote Code

Zyxel Format String Flaw Let Attackers Execute Unauthorized Remote Code

Published on

SIEM as a Service

Follow Us on Google News

In a warning to its customers today, Zyxel has notified them of a vulnerability that poses a risk for RCE attacks. The issue affects three models of the company’s network-attached storage products.

The cybersecurity analysts at Zyxel have tracked the vulnerability as “CVE-2022-34747.” Through the use of a crafted UDP packet, a malicious attacker could be able to achieve RCE without the user’s knowledge.

On June 2022, this vulnerability was discovered by the security expert Shaposhnikov Ilya. Therefore, over the course of the next few months, Zyxel progressively released security updates for the affected models under the affected model number.

- Advertisement - Google News
  • CVE ID: CVE-2022-34747
  • Description: It’s a format string vulnerability.
  • Base Score: 9.8
  • Severity: Critical
  • Source:: Zyxel Corporation

Affected Products

A series of Zyxel products are affected by this flaw, including:-

  • NAS326: V5.21(AAZF.11)C0 and earlier, (Patch: V5.21(AAZF.12)C0)
  • NAS540: V5.21(AATB.8)C0 and earlier, (Patch: V5.21(AATB.9)C0)
  • NAS542: V5.21(ABAG.8)C0 and earlier, (Patch: V5.21(ABAG.9)C0)

In recent years, hackers have become increasingly adept at hacking NAS devices. A hacker can steal your sensitive and personal information if you do not take precautions or keep your software up-to-date in order to protect yourself. 

Not only that, data can even be permanently deleted in some instances if they are extremely persistent and deploy ransomware as well. While the latest firmware update for Zyxel devices can be downloaded by visiting Zyxel’s official download portal.

There have been multiple vulnerabilities identified across multiple products by Zyxel and they have been addressed through security updates released in May 2022.

All of these scenarios are threatening, but ransomware is the most common and the most dangerous among them. It is clear that ransomware is the best method for threat actors to monetize their success if it is successfully exploited.

Secure Azure AD Conditional Access – Download Free White Paper

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hackers Circulate Over 93 Billion Stolen User Cookies on the Dark Web

Web cookies, those ubiquitous pop-ups we routinely dismiss with a click, are small text...

Robinhood Ransomware Operator Arrested for Attacks on Government and Private Networks

On May 27, 2025, Iranian national Sina Gholinejad, 37, pleaded guilty in a North...

CISA Releases Executive Guide on SIEM and SOAR Platforms for Rapid Threat Detection

In today’s rapidly evolving threat landscape, Security Information and Event Management (SIEM) and Security...

MATLAB, Serving Over 5 Million Users, Hit by Ransomware Attack

MathWorks, the renowned developer of MATLAB and Simulink, has been grappling with the aftermath...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Severe WSO2 SOAP Flaw Allows Unauthorized Password Resets for Any Use

A newly disclosed vulnerability, CVE-2024-6914, has shocked the enterprise software community, affecting a wide...

CISA Alerts on Threat Actors Targeting Commvault Azure App to Steal Secrets

On May 22, 2025, Commvault, a leading enterprise data backup provider, issued an urgent...

PoC Code Published for Linux nftables Security Vulnerability

Security researchers have published proof-of-concept (PoC) exploit code for CVE-2024-26809, a high-severity double-free vulnerability in...