A vulnerability in specific versions of Zyxel NBG6818, NBG7815, WSQ20, WSQ50, WSQ60, and WSR30 firmware with pre-configured password management could allow an attacker to obtain root access of the device, if the local attacker dismantles the device and uses a USB-to-UART cable to connect the device, or if the remote assistance feature had been enabled by an authenticated user.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.tenable.com/security/research/tra-2022-06 | Exploit Third Party Advisory | 
| https://www.zyxel.com/support/Zyxel_security_advisory_for_pre-configured_password_management_vulnerability_of_home_routers_and_WiFi_systems.shtml | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
Configuration 2 (hide)
| AND | 
 
 | 
Configuration 3 (hide)
| AND | 
 
 | 
Configuration 4 (hide)
| AND | 
 
 | 
Configuration 5 (hide)
| AND | 
 
 | 
Configuration 6 (hide)
| AND | 
 
 | 
History
                    No history.
Information
                Published : 2021-11-23 22:15
Updated : 2022-10-27 16:59
NVD link : CVE-2021-35033
Mitre link : CVE-2021-35033
CVE.ORG link : CVE-2021-35033
JSON object : View
Products Affected
                zyxel
- wsq50_firmware
- wsq20
- nbg6818_firmware
- nbg7815_firmware
- wsr30_firmware
- wsr30
- nbg6818
- wsq60
- wsq50
- wsq20_firmware
- wsq60_firmware
- nbg7815
