A reflective Cross-site scripting (XSS) vulnerability in the free_time_failed.cgi CGI program in selected Zyxel ZyWall, USG, and UAG devices allows remote attackers to inject arbitrary web script or HTML via the err_msg parameter.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://www.zyxel.com/us/en/ | vendor advisory |
https://www.zyxel.com/support/vulnerabilities-related-to-the-Free-Time-feature.shtml | patch vendor advisory |
https://sec-consult.com/en/blog/advisories/reflected-cross-site-scripting-in-zxel-zywall/index.html | exploit third party advisory patch |
https://n-thumann.de/blog/zyxel-gateways-missing-access-control-in-account-generator-xss/ | third party advisory exploit |