6.5
MEDIUM
CVE-2023-37929
VMG3625-T50B Buffer Overflow Remote DoS
Description

The buffer overflow vulnerability in the CGI program of the VMG3625-T50B firmware version V5.50(ABPM.8)C0 could allow an authenticated remote attacker to cause denial of service (DoS) conditions by sending a crafted HTTP request to a vulnerable device.

INFO

Published Date :

May 21, 2024, 2:15 a.m.

Last Modified :

Jan. 22, 2025, 10:55 p.m.

Remotely Exploitable :

Yes !

Impact Score :

3.6

Exploitability Score :

2.8
Public PoC/Exploit Available at Github

CVE-2023-37929 has a 1 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

Affected Products

The following products are affected by CVE-2023-37929 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Zyxel dx3301-t0_firmware
2 Zyxel dx5401-b0_firmware
3 Zyxel emg3525-t50b_firmware
4 Zyxel emg5523-t50b_firmware
5 Zyxel emg5723-t50k_firmware
6 Zyxel ex3301-t0_firmware
7 Zyxel ex5401-b0_firmware
8 Zyxel ex5501-b0_firmware
9 Zyxel ex5512-t0_firmware
10 Zyxel ex5600-t1_firmware
11 Zyxel ex5601-t0_firmware
12 Zyxel ex5601-t1_firmware
13 Zyxel vmg3927-t50k_firmware
14 Zyxel vmg8623-t50b_firmware
15 Zyxel vmg8825-t50k_firmware
16 Zyxel ax7501-b0_firmware
17 Zyxel wx3100-t0_firmware
18 Zyxel wx5600-t0_firmware
19 Zyxel nbg7510_firmware
20 Zyxel vmg3625-t50b_firmware
21 Zyxel wx5600-t0
22 Zyxel wx3100-t0
23 Zyxel ax7501-b1_firmware
24 Zyxel ax7501-b1
25 Zyxel ax7501-b0
26 Zyxel vmg8825-t50k
27 Zyxel vmg8623-t50b
28 Zyxel vmg3927-t50k
29 Zyxel vmg3625-t50b
30 Zyxel emg5723-t50k
31 Zyxel emg5523-t50b
32 Zyxel emg3525-t50b
33 Zyxel ex7710-b0_firmware
34 Zyxel ex7710-b0
35 Zyxel ex5601-t1
36 Zyxel ex5601-t0
37 Zyxel ex5512-t0
38 Zyxel ex5401-b1_firmware
39 Zyxel ex5401-b1
40 Zyxel ex5401-b0
41 Zyxel ex3501-t0_firmware
42 Zyxel ex3501-t0
43 Zyxel ex3500-t0_firmware
44 Zyxel ex3500-t0
45 Zyxel ex3301-t0
46 Zyxel ex3300-t1_firmware
47 Zyxel ex3300-t1
48 Zyxel dx5401-b1_firmware
49 Zyxel dx5401-b1
50 Zyxel dx5401-b0
51 Zyxel dx3301-t0
52 Zyxel dx3300-t1_firmware
53 Zyxel dx3300-t1
54 Zyxel ex5501-b0
55 Zyxel nbg7510
56 Zyxel ex5600-t1
57 Zyxel wx5610-b0_firmware
58 Zyxel wx5610-b0
59 Zyxel dx4510_firmware
60 Zyxel dx4510
61 Zyxel ex3510_firmware
62 Zyxel ex3510
63 Zyxel ex5510_firmware
64 Zyxel ex5510

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

None

Updated: 3 months, 4 weeks ago
26 stars 6 fork 6 watcher
Born at : Aug. 16, 2022, 4:38 a.m. This repo has been linked 3 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2023-37929 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2023-37929 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Initial Analysis by [email protected]

    Jan. 22, 2025

    Action Type Old Value New Value
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:ax7501-b0_firmware:5.17\(abpc.4\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:ax7501-b0:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:ax7501-b1_firmware:5.17\(abpc.4\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:ax7501-b1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:dx3300-t1_firmware:5.50\(aby.4\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:dx3300-t1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:dx3301-t0_firmware:5.50\(aby.4\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:dx3301-t0:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:dx4510_firmware:5.17\(abyl.5\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:dx4510:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:dx5401-b0_firmware:5.17\(abyo.5\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:dx5401-b0:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:dx5401-b1_firmware:5.17\(abyo.5\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:dx5401-b1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:emg3525-t50b_firmware:5.50\(abpm.8\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:emg3525-t50b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:emg5523-t50b_firmware:5.50\(abpm.8\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:emg5523-t50b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:emg5723-t50k_firmware:5.50\(abom.8.2\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:emg5723-t50k:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:ex3300-t1_firmware:5.50\(aby.4\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:ex3300-t1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:ex3301-t0_firmware:5.50\(aby.4\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:ex3301-t0:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:ex3500-t0_firmware:5.44\(achr.0\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:ex3500-t0:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:ex3501-t0_firmware:5.44\(achr.0\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:ex3501-t0:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:ex3510_firmware:5.17\(abup.9\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:ex3510:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:ex5401-b0_firmware:5.17\(abyo.5\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:ex5401-b0:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:ex5401-b1_firmware:5.17\(abyo.5\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:ex5401-b1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:ex5501-b0_firmware:5.17\(abry.4\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:ex5501-b0:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:ex5510_firmware:5.17\(abqx.8\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:ex5510:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:ex5512-t0_firmware:5.70\(aceg.2\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:ex5512-t0:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:ex5600-t1_firmware:5.70\(acdz.2\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:ex5600-t1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:ex5601-t0_firmware:5.70\(acdz.2\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:ex5601-t0:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:ex5601-t1_firmware:5.70\(acdz.2\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:ex5601-t1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:ex7710-b0_firmware:5.18\(acak.0\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:ex7710-b0:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:nbg7510_firmware:1.00\(abzy.5\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:nbg7510:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:vmg3625-t50b_firmware:5.50\(abpm.8\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:vmg3625-t50b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:vmg3927-t50k_firmware:5.50\(abom.8.2\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:vmg3927-t50k:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:vmg8623-t50b_firmware:5.50\(abpm.8\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:vmg8623-t50b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:vmg8825-t50k_firmware:5.50\(abom.8.2\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:vmg8825-t50k:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:wx3100-t0_firmware:5.50\(abl.3\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:wx3100-t0:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:wx5600-t0_firmware:5.70\(aceb.2\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:wx5600-t0:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:wx5610-b0_firmware:5.18\(acgj.0\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:wx5610-b0:-:*:*:*:*:*:*:*
    Changed Reference Type https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-buffer-overflow-vulnerabilities-in-some-5g-nr-4g-lte-cpe-dsl-ethernet-cpe-fiber-ont-wifi-extender-and-home-router-devices-05-21-2024 No Types Assigned https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-buffer-overflow-vulnerabilities-in-some-5g-nr-4g-lte-cpe-dsl-ethernet-cpe-fiber-ont-wifi-extender-and-home-router-devices-05-21-2024 Vendor Advisory
    Changed Reference Type https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-buffer-overflow-vulnerabilities-in-some-5g-nr-4g-lte-cpe-dsl-ethernet-cpe-fiber-ont-wifi-extender-and-home-router-devices-05-21-2024 No Types Assigned https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-buffer-overflow-vulnerabilities-in-some-5g-nr-4g-lte-cpe-dsl-ethernet-cpe-fiber-ont-wifi-extender-and-home-router-devices-05-21-2024 Vendor Advisory
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-buffer-overflow-vulnerabilities-in-some-5g-nr-4g-lte-cpe-dsl-ethernet-cpe-fiber-ont-wifi-extender-and-home-router-devices-05-21-2024
  • CVE Received by [email protected]

    May. 21, 2024

    Action Type Old Value New Value
    Added Description The buffer overflow vulnerability in the CGI program of the VMG3625-T50B firmware version V5.50(ABPM.8)C0 could allow an authenticated remote attacker to cause denial of service (DoS) conditions by sending a crafted HTTP request to a vulnerable device.
    Added Reference Zyxel Corporation https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-buffer-overflow-vulnerabilities-in-some-5g-nr-4g-lte-cpe-dsl-ethernet-cpe-fiber-ont-wifi-extender-and-home-router-devices-05-21-2024 [No types assigned]
    Added CWE Zyxel Corporation CWE-120
    Added CVSS V3.1 Zyxel Corporation AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2023-37929 is associated with the following CWEs:

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability