CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-0816

Medium Severity
Zyxel
SVRS
34/100

CVSSv3
NA/10

EPSS
0.00033/1

CVE-2024-0816 is a buffer overflow vulnerability in DX3300-T1 firmware. This flaw could allow an authenticated local attacker to trigger a denial-of-service (DoS) condition. The vulnerability exists in firmware version V5.50(ABVY.4)C0, and can be exploited by executing CLI commands with crafted strings. While the CVSS score is 0, the SOCRadar Vulnerability Risk Score (SVRS) is 34, indicating a moderate level of risk, lower than critical. Successful exploitation results in DoS, disrupting device functionality. This CVE is significant because it highlights weaknesses in firmware security and the importance of input validation. Although not critical, it still warrants attention and patching to prevent potential disruptions.

In The Wild
2024-05-21

2025-01-22
Eye Icon
SOCRadar
AI Insight

Description:

CVE-2024-0816 is a buffer overflow vulnerability in the DX3300-T1 firmware version V5.50(ABVY.4)C0. An authenticated local attacker could exploit this vulnerability by executing a CLI command with crafted strings on an affected device, leading to denial of service (DoS) conditions. The SVRS for this CVE is 34, indicating a moderate risk level.

Key Insights:

  • Authenticated Local Attack: The vulnerability requires an attacker to be authenticated on the affected device, making it less likely to be exploited remotely.
  • DoS Impact: The vulnerability can cause DoS conditions, disrupting the availability of the affected device.
  • Firmware Version: The vulnerability affects only devices running firmware version V5.50(ABVY.4)C0.

Mitigation Strategies:

  • Update Firmware: Update the firmware to the latest version to patch the vulnerability.
  • Restrict Access: Implement access controls to limit the number of users who can authenticate to the affected device.
  • Monitor Network Traffic: Monitor network traffic for suspicious activity that could indicate an exploitation attempt.

Additional Information:

  • Threat Actors/APT Groups: No specific threat actors or APT groups have been identified as actively exploiting this vulnerability.
  • Exploit Status: No active exploits have been published.
  • CISA Warnings: The Cybersecurity and Infrastructure Security Agency (CISA) has not issued a warning for this vulnerability.
  • In the Wild: The vulnerability is not known to be actively exploited in the wild.

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-0816 | Zyxel DX3300-T1 V5.50(ABVY.4)C0 CLI buffer overflow
vuldb.com2025-01-23
CVE-2024-0816 | Zyxel DX3300-T1 V5.50(ABVY.4)C0 CLI buffer overflow | A vulnerability was found in Zyxel DX3300-T1 V5.50(ABVY.4)C0. It has been rated as critical. This issue affects some unknown processing of the component CLI. The manipulation leads to buffer overflow. The identification of this vulnerability is CVE-2024-0816. It is possible to launch the attack on the local
vuldb.com
rss
forum
news

Social Media

CVE-2024-0816 The buffer overflow vulnerability in the DX3300-T1 firmware version V5.50(ABVY.4)C0 could allow an authenticated local attacker to cause denial of service (DoS) conditi… https://t.co/QJ32z7P7dA
0
0
0

Affected Software

Configuration 1
TypeVendorProduct
OSZyxellte3202-m437_firmware
Configuration 2
TypeVendorProduct
OSZyxellte3301-plus_firmware
Configuration 3
TypeVendorProduct
OSZyxellte5388-m804_firmware
Configuration 4
TypeVendorProduct
OSZyxellte5398-m904_firmware
Configuration 5
TypeVendorProduct
OSZyxellte7240-m403_firmware
Configuration 6
TypeVendorProduct
OSZyxellte7480-m804_firmware
Configuration 7
TypeVendorProduct
OSZyxellte7490-m904_firmware
Configuration 8
TypeVendorProduct
OSZyxelnr5103_firmware
Configuration 9
TypeVendorProduct
OSZyxelnr5103e_firmware
Configuration 10
TypeVendorProduct
OSZyxelnr5103ev2_firmware
Configuration 11
TypeVendorProduct
OSZyxelnr5307_firmware
Configuration 12
TypeVendorProduct
OSZyxelnr7101_firmware
Configuration 13
TypeVendorProduct
OSZyxelnr7102_firmware
Configuration 14
TypeVendorProduct
OSZyxelnr7103_firmware
Configuration 15
TypeVendorProduct
OSZyxelnr7302_firmware
Configuration 16
TypeVendorProduct
OSZyxelnr7303_firmware
Configuration 17
TypeVendorProduct
OSZyxelnr7501_firmware
Configuration 18
TypeVendorProduct
OSZyxelnebula_fwa505_firmware
Configuration 19
TypeVendorProduct
OSZyxelnebula_fwa510_firmware
Configuration 20
TypeVendorProduct
OSZyxelnebula_fwa710_firmware
Configuration 21
TypeVendorProduct
OSZyxelnebula_lte3301-plus_firmware
Configuration 22
TypeVendorProduct
OSZyxelnebula_lte7461-m602_firmware
Configuration 23
TypeVendorProduct
OSZyxelnebula_nr5101_firmware
Configuration 24
TypeVendorProduct
OSZyxelnebula_nr7101_firmware
Configuration 25
TypeVendorProduct
OSZyxeldx3300-t1_firmware
Configuration 26
TypeVendorProduct
OSZyxeldx3301-t0_firmware
Configuration 27
TypeVendorProduct
OSZyxeldx4510_firmware
Configuration 28
TypeVendorProduct
OSZyxeldx5401-b0_firmware
Configuration 29
TypeVendorProduct
OSZyxeldx5401-b1_firmware
Configuration 30
TypeVendorProduct
OSZyxelemg3525-t50b_firmware
Configuration 31
TypeVendorProduct
OSZyxelemg5523-t50b_firmware
Configuration 32
TypeVendorProduct
OSZyxelemg5723-t50k_firmware
Configuration 33
TypeVendorProduct
OSZyxelex3300-t1_firmware
Configuration 34
TypeVendorProduct
OSZyxelex3301-t0_firmware
Configuration 35
TypeVendorProduct
OSZyxelex3320-t0_firmware
Configuration 36
TypeVendorProduct
OSZyxelex3320-t1_firmware
Configuration 37
TypeVendorProduct
OSZyxelex3500-t0_firmware
Configuration 38
TypeVendorProduct
OSZyxelex3501-t0_firmware
Configuration 39
TypeVendorProduct
OSZyxelex3510_firmware
Configuration 40
TypeVendorProduct
OSZyxelex5401-b0_firmware
Configuration 41
TypeVendorProduct
OSZyxelex5401-b1_firmware
Configuration 42
TypeVendorProduct
OSZyxelex5501-b0_firmware
Configuration 43
TypeVendorProduct
OSZyxelex5510_firmware
Configuration 44
TypeVendorProduct
OSZyxelex5512-t0_firmware
Configuration 45
TypeVendorProduct
OSZyxelex5600-t1_firmware
Configuration 46
TypeVendorProduct
OSZyxelex5601-t0_firmware
Configuration 47
TypeVendorProduct
OSZyxelex5601-t1_firmware
Configuration 48
TypeVendorProduct
OSZyxelex7710-b0_firmware
Configuration 49
TypeVendorProduct
OSZyxelvmg3625-t50b_firmware
Configuration 50
TypeVendorProduct
OSZyxelvmg3927-t50k_firmware
Configuration 51
TypeVendorProduct
OSZyxelvmg4005-b50a_firmware
Configuration 52
TypeVendorProduct
OSZyxelvmg4005-b60a_firmware
Configuration 53
TypeVendorProduct
OSZyxelvmg8623-t50b_firmware
Configuration 54
TypeVendorProduct
OSZyxelvmg8825-t50k_firmware
Configuration 55
TypeVendorProduct
OSZyxelax7501-b0_firmware
Configuration 56
TypeVendorProduct
OSZyxelax7501-b1_firmware
Configuration 57
TypeVendorProduct
OSZyxelpm3100-t0_firmware
Configuration 58
TypeVendorProduct
OSZyxelpm5100-t0_firmware
Configuration 59
TypeVendorProduct
OSZyxelpm7300-t0_firmware
Configuration 60
TypeVendorProduct
OSZyxelpx3321-t1_firmware
Configuration 61
TypeVendorProduct
OSZyxelwx3100-t0_firmware
Configuration 62
TypeVendorProduct
OSZyxelwx3401-b0_firmware
Configuration 63
TypeVendorProduct
OSZyxelwx5600-t0_firmware
Configuration 64
TypeVendorProduct
OSZyxelwx5610-b0_firmware
Configuration 65
TypeVendorProduct
OSZyxelnbg7510_firmware

References

ReferenceLink
[email protected]https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-buffer-overflow-vulnerabilities-in-some-5g-nr-4g-lte-cpe-dsl-ethernet-cpe-fiber-ont-wifi-extender-and-home-router-devices-05-21-2024
AF854A3A-2127-422B-91AE-364DA2661108https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-buffer-overflow-vulnerabilities-in-some-5g-nr-4g-lte-cpe-dsl-ethernet-cpe-fiber-ont-wifi-extender-and-home-router-devices-05-21-2024
[email protected]https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-buffer-overflow-vulnerabilities-in-some-5g-nr-4g-lte-cpe-dsl-ethernet-cpe-fiber-ont-wifi-extender-and-home-router-devices-05-21-2024

CWE Details

CWE IDCWE NameDescription
CWE-120Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')The program copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence