Skip to content

Commit cc46ad7

Browse files
committed
automatic module_metadata_base.json update
1 parent 4909a43 commit cc46ad7

File tree

1 file changed

+61
-0
lines changed

1 file changed

+61
-0
lines changed

db/modules_metadata_base.json

Lines changed: 61 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -84408,6 +84408,67 @@
8440884408
"session_types": false,
8440984409
"needs_cleanup": null
8441084410
},
84411+
"exploit_linux/http/zyxel_parse_config_rce": {
84412+
"name": "Zyxel parse_config.py Command Injection",
84413+
"fullname": "exploit/linux/http/zyxel_parse_config_rce",
84414+
"aliases": [
84415+
84416+
],
84417+
"rank": 300,
84418+
"disclosure_date": "2024-01-24",
84419+
"type": "exploit",
84420+
"author": [
84421+
"SSD Secure Disclosure technical team",
84422+
"jheysel-r7"
84423+
],
84424+
"description": "This module exploits vulnerabilities in multiple Zyxel devices including the VPN, USG and APT series.\n The affected firmware versions depend on the device module, see this module's documentation for more details.\n\n Note this module was unable to be tested against a real Zyxel device and was tested against a mock environment.\n If you run into any issues testing this in a real environment we kindly ask you raise an issue in\n metasploit's github repository: https://github.com/rapid7/metasploit-framework/issues/new/choose",
84425+
"references": [
84426+
"URL-https://ssd-disclosure.com/ssd-advisory-zyxel-vpn-series-pre-auth-remote-command-execution/",
84427+
"CVE-2023-33012"
84428+
],
84429+
"platform": "Linux,Unix",
84430+
"arch": "cmd",
84431+
"rport": 80,
84432+
"autofilter_ports": [
84433+
80,
84434+
8080,
84435+
443,
84436+
8000,
84437+
8888,
84438+
8880,
84439+
8008,
84440+
3000,
84441+
8443
84442+
],
84443+
"autofilter_services": [
84444+
"http",
84445+
"https"
84446+
],
84447+
"targets": [
84448+
"Automatic Target"
84449+
],
84450+
"mod_time": "2024-07-03 13:51:50 +0000",
84451+
"path": "/modules/exploits/linux/http/zyxel_parse_config_rce.rb",
84452+
"is_install_path": true,
84453+
"ref_name": "linux/http/zyxel_parse_config_rce",
84454+
"check": true,
84455+
"post_auth": false,
84456+
"default_credential": false,
84457+
"notes": {
84458+
"Stability": [
84459+
"crash-safe"
84460+
],
84461+
"SideEffects": [
84462+
"artifacts-on-disk",
84463+
"config-changes"
84464+
],
84465+
"Reliability": [
84466+
84467+
]
84468+
},
84469+
"session_types": false,
84470+
"needs_cleanup": true
84471+
},
8441184472
"exploit_linux/http/zyxel_ztp_rce": {
8441284473
"name": "Zyxel Firewall ZTP Unauthenticated Command Injection",
8441384474
"fullname": "exploit/linux/http/zyxel_ztp_rce",

0 commit comments

Comments
 (0)