5.5
MEDIUM
CVE-2024-0816
Citrix Systems DX3300-T1 Buffer Overflow DoS
Description

The buffer overflow vulnerability in the DX3300-T1 firmware version V5.50(ABVY.4)C0 could allow an authenticated local attacker to cause denial of service (DoS) conditions by executing the CLI command with crafted strings on an affected device.

INFO

Published Date :

May 21, 2024, 2:15 a.m.

Last Modified :

Jan. 22, 2025, 10:58 p.m.

Remotely Exploitable :

No

Impact Score :

3.6

Exploitability Score :

1.8
Affected Products

The following products are affected by CVE-2024-0816 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Zyxel lte3202-m437_firmware
2 Zyxel lte7480-m804_firmware
3 Zyxel lte7490-m904_firmware
4 Zyxel nebula_fwa510_firmware
5 Zyxel nebula_fwa710_firmware
6 Zyxel nebula_nr7101_firmware
7 Zyxel nr5103_firmware
8 Zyxel nr5103e_firmware
9 Zyxel nr7101_firmware
10 Zyxel nr7102_firmware
11 Zyxel nr7103_firmware
12 Zyxel nebula_nr5101_firmware
13 Zyxel dx3301-t0_firmware
14 Zyxel dx5401-b0_firmware
15 Zyxel emg3525-t50b_firmware
16 Zyxel emg5523-t50b_firmware
17 Zyxel emg5723-t50k_firmware
18 Zyxel ex3301-t0_firmware
19 Zyxel ex5401-b0_firmware
20 Zyxel ex5501-b0_firmware
21 Zyxel ex5512-t0_firmware
22 Zyxel ex5600-t1_firmware
23 Zyxel ex5601-t0_firmware
24 Zyxel ex5601-t1_firmware
25 Zyxel vmg3927-t50k_firmware
26 Zyxel vmg4005-b50a_firmware
27 Zyxel vmg4005-b60a_firmware
28 Zyxel vmg8623-t50b_firmware
29 Zyxel vmg8825-t50k_firmware
30 Zyxel ax7501-b0_firmware
31 Zyxel pm3100-t0_firmware
32 Zyxel pm5100-t0_firmware
33 Zyxel pm7300-t0_firmware
34 Zyxel wx3100-t0_firmware
35 Zyxel wx3401-b0_firmware
36 Zyxel wx5600-t0_firmware
37 Zyxel lte3301-plus_firmware
38 Zyxel lte5388-m804_firmware
39 Zyxel lte5398-m904_firmware
40 Zyxel lte7240-m403_firmware
41 Zyxel nebula_lte3301-plus_firmware
42 Zyxel nebula_lte7461-m602_firmware
43 Zyxel nbg7510_firmware
44 Zyxel vmg3625-t50b_firmware
45 Zyxel nebula_lte3301-plus
46 Zyxel nebula_fwa505_firmware
47 Zyxel nebula_fwa505
48 Zyxel nebula_fwa710
49 Zyxel nebula_fwa510
50 Zyxel wx5600-t0
51 Zyxel wx3401-b0
52 Zyxel wx3100-t0
53 Zyxel px3321-t1_firmware
54 Zyxel px3321-t1
55 Zyxel pm7300-t0
56 Zyxel pm5100-t0
57 Zyxel pm3100-t0
58 Zyxel ax7501-b1_firmware
59 Zyxel ax7501-b1
60 Zyxel ax7501-b0
61 Zyxel vmg8825-t50k
62 Zyxel vmg8623-t50b
63 Zyxel vmg4005-b60a
64 Zyxel vmg4005-b50a
65 Zyxel vmg3927-t50k
66 Zyxel vmg3625-t50b
67 Zyxel emg5723-t50k
68 Zyxel emg5523-t50b
69 Zyxel emg3525-t50b
70 Zyxel ex7710-b0_firmware
71 Zyxel ex7710-b0
72 Zyxel ex5601-t1
73 Zyxel ex5601-t0
74 Zyxel ex5512-t0
75 Zyxel ex5401-b1_firmware
76 Zyxel ex5401-b1
77 Zyxel ex5401-b0
78 Zyxel ex3501-t0_firmware
79 Zyxel ex3501-t0
80 Zyxel ex3500-t0_firmware
81 Zyxel ex3500-t0
82 Zyxel ex3301-t0
83 Zyxel ex3300-t1_firmware
84 Zyxel ex3300-t1
85 Zyxel dx5401-b1_firmware
86 Zyxel dx5401-b1
87 Zyxel dx5401-b0
88 Zyxel dx3301-t0
89 Zyxel dx3300-t1_firmware
90 Zyxel dx3300-t1
91 Zyxel nr7501_firmware
92 Zyxel nr7501
93 Zyxel nr7303_firmware
94 Zyxel nr7303
95 Zyxel nr7302_firmware
96 Zyxel nr7302
97 Zyxel nr7103
98 Zyxel nr5307_firmware
99 Zyxel nr5307
100 Zyxel nr5103ev2_firmware
101 Zyxel nr5103ev2
102 Zyxel nr5103
103 Zyxel ex5501-b0
104 Zyxel lte3301-plus
105 Zyxel lte5388-m804
106 Zyxel lte5398-m904
107 Zyxel lte7240-m403
108 Zyxel lte7480-m804
109 Zyxel nr7101
110 Zyxel nr7102
111 Zyxel nbg7510
112 Zyxel lte3202-m437
113 Zyxel lte7490-m904
114 Zyxel nebula_nr7101
115 Zyxel nr5103e
116 Zyxel nebula_nr5101
117 Zyxel ex5600-t1
118 Zyxel nebula_lte7461-m602
119 Zyxel wx5610-b0_firmware
120 Zyxel wx5610-b0
121 Zyxel dx4510_firmware
122 Zyxel dx4510
123 Zyxel ex3510_firmware
124 Zyxel ex3510
125 Zyxel ex5510_firmware
126 Zyxel ex5510
127 Zyxel ex3320-t0_firmware
128 Zyxel ex3320-t0
129 Zyxel ex3320-t1_firmware
130 Zyxel ex3320-t1

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2024-0816 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2024-0816 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Initial Analysis by [email protected]

    Jan. 22, 2025

    Action Type Old Value New Value
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:ax7501-b0_firmware:5.17\(abpc.4\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:ax7501-b0:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:ax7501-b1_firmware:5.17\(abpc.4\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:ax7501-b1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:dx3300-t1_firmware:5.50\(aby.4\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:dx3300-t1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:dx3301-t0_firmware:5.50\(aby.4\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:dx3301-t0:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:dx4510_firmware:5.17\(abyl.6\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:dx4510:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:dx5401-b0_firmware:5.17\(abyo.5\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:dx5401-b0:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:dx5401-b1_firmware:5.17\(abyo.5\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:dx5401-b1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:emg3525-t50b_firmware:5.50\(abpm.8\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:emg3525-t50b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:emg5523-t50b_firmware:5.50\(abpm.8\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:emg5523-t50b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:emg5723-t50k_firmware:5.50\(abom.8.2\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:emg5723-t50k:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:ex3300-t1_firmware:5.50\(aby.4\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:ex3300-t1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:ex3301-t0_firmware:5.50\(aby.4\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:ex3301-t0:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:ex3320-t0_firmware:5.71\(yak.2\)d0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:ex3320-t0:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:ex3320-t1_firmware:5.71\(yap.0\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:ex3320-t1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:ex3500-t0_firmware:5.44\(achr.0\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:ex3500-t0:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:ex3501-t0_firmware:5.44\(achr.0\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:ex3501-t0:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:ex3510_firmware:5.17\(abup.11\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:ex3510:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:ex5401-b0_firmware:5.17\(abyo.5\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:ex5401-b0:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:ex5401-b1_firmware:5.17\(abyo.5\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:ex5401-b1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:ex5501-b0_firmware:5.17\(abry.4\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:ex5501-b0:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:ex5510_firmware:5.17\(abqx.9\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:ex5510:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:ex5512-t0_firmware:5.70\(aceg.2\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:ex5512-t0:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:ex5600-t1_firmware:5.70\(acdz.2\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:ex5600-t1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:ex5601-t0_firmware:5.70\(acdz.2\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:ex5601-t0:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:ex5601-t1_firmware:5.70\(acdz.2\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:ex5601-t1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:ex7710-b0_firmware:5.18\(acak.0\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:ex7710-b0:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:lte3202-m437_firmware:1.00\(abwf.3\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:lte3202-m437:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:lte3301-plus_firmware:1.00\(abqu.5\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:lte3301-plus:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:lte5388-m804_firmware:1.00\(absq.4\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:lte5388-m804:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:lte5398-m904_firmware:1.00\(abq.4\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:lte5398-m904:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:lte7240-m403_firmware:2.00\(abmg.7\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:lte7240-m403:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:lte7480-m804_firmware:1.00\(abra.8\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:lte7480-m804:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:lte7490-m904_firmware:1.00\(abqy.7\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:lte7490-m904:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:nbg7510_firmware:1.00\(abzy.6\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:nbg7510:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:nebula_fwa505_firmware:1.18\(acko.1\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:nebula_fwa505:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:nebula_fwa510_firmware:1.18\(acgd.1\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:nebula_fwa510:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:nebula_fwa710_firmware:1.17\(acgc.0\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:nebula_fwa710:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:nebula_lte3301-plus_firmware:1.17\(acca.0\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:nebula_lte3301-plus:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:nebula_lte7461-m602_firmware:1.15\(ace.3\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:nebula_lte7461-m602:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:nebula_nr5101_firmware:1.16\(accg.0\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:nebula_nr5101:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:nebula_nr7101_firmware:1.16\(accc.0\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:nebula_nr7101:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:nr5103_firmware:4.19\(abyc.5\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:nr5103:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:nr5103e_firmware:1.00\(acdj.1\)b3:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:nr5103e:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:nr5103ev2_firmware:1.00\(aciq.0\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:nr5103ev2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:nr5307_firmware:1.00\(acjt.0\)b4:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:nr5307:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:nr7101_firmware:1.00\(abu.9\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:nr7101:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:nr7102_firmware:1.00\(abyd.2\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:nr7102:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:nr7103_firmware:1.00\(accz.2\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:nr7103:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:nr7302_firmware:1.00\(acha.2\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:nr7302:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:nr7303_firmware:1.00\(acei.0\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:nr7303:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:nr7501_firmware:1.00\(aceh.0\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:nr7501:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:pm3100-t0_firmware:5.42\(acbf.1.2\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:pm3100-t0:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:pm5100-t0_firmware:5.42\(acbf.1.2\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:pm5100-t0:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:pm7300-t0_firmware:5.42\(abyy.1\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:pm7300-t0:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:px3321-t1_firmware:5.44\(acjb.0\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:px3321-t1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:vmg3625-t50b_firmware:5.50\(abpm.8\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:vmg3625-t50b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:vmg3927-t50k_firmware:5.50\(abom.8.2\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:vmg3927-t50k:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:vmg4005-b50a_firmware:5.17\(abqa.2\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:vmg4005-b50a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:vmg4005-b60a_firmware:5.17\(abqa.2\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:vmg4005-b60a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:vmg8623-t50b_firmware:5.50\(abpm.8\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:vmg8623-t50b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:vmg8825-t50k_firmware:5.50\(abom.8.2\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:vmg8825-t50k:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:wx3100-t0_firmware:5.50\(abl.3\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:wx3100-t0:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:wx3401-b0_firmware:5.17\(abe.2\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:wx3401-b0:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:wx5600-t0_firmware:5.70\(acdz.2\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:wx5600-t0:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:zyxel:wx5610-b0_firmware:5.18\(acgj.0\)c0:*:*:*:*:*:*:* OR cpe:2.3:h:zyxel:wx5610-b0:-:*:*:*:*:*:*:*
    Changed Reference Type https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-buffer-overflow-vulnerabilities-in-some-5g-nr-4g-lte-cpe-dsl-ethernet-cpe-fiber-ont-wifi-extender-and-home-router-devices-05-21-2024 No Types Assigned https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-buffer-overflow-vulnerabilities-in-some-5g-nr-4g-lte-cpe-dsl-ethernet-cpe-fiber-ont-wifi-extender-and-home-router-devices-05-21-2024 Vendor Advisory
    Changed Reference Type https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-buffer-overflow-vulnerabilities-in-some-5g-nr-4g-lte-cpe-dsl-ethernet-cpe-fiber-ont-wifi-extender-and-home-router-devices-05-21-2024 No Types Assigned https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-buffer-overflow-vulnerabilities-in-some-5g-nr-4g-lte-cpe-dsl-ethernet-cpe-fiber-ont-wifi-extender-and-home-router-devices-05-21-2024 Vendor Advisory
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-buffer-overflow-vulnerabilities-in-some-5g-nr-4g-lte-cpe-dsl-ethernet-cpe-fiber-ont-wifi-extender-and-home-router-devices-05-21-2024
  • CVE Received by [email protected]

    May. 21, 2024

    Action Type Old Value New Value
    Added Description The buffer overflow vulnerability in the DX3300-T1 firmware version V5.50(ABVY.4)C0 could allow an authenticated local attacker to cause denial of service (DoS) conditions by executing the CLI command with crafted strings on an affected device.
    Added Reference Zyxel Corporation https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-buffer-overflow-vulnerabilities-in-some-5g-nr-4g-lte-cpe-dsl-ethernet-cpe-fiber-ont-wifi-extender-and-home-router-devices-05-21-2024 [No types assigned]
    Added CWE Zyxel Corporation CWE-120
    Added CVSS V3.1 Zyxel Corporation AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2024-0816 is associated with the following CWEs:

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability