CVE-2023-22922
Published May 1, 2023
Last updated 2 years ago
Overview
- Description
- A buffer overflow vulnerability in the Zyxel NBG-418N v2 firmware versions prior to V1.00(AARP.14)C0 could allow a remote unauthenticated attacker to cause DoS conditions by sending crafted packets if Telnet is enabled on a vulnerable device.
- Source
- security@zyxel.com.tw
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Severity
- HIGH
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:zyxel:nbg-418n_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF173A52-88FB-4D7A-A22B-8F016EE07E06", "versionEndIncluding": "1.00\\(aarp.13\\)c0" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:zyxel:nbg-418n:v2:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B864E108-4477-4D56-B635-95A4B5F86AE1" } ], "operator": "OR" } ], "operator": "AND" } ]