A OS command injection vulnerability in the CGI program of Zyxel USG FLEX 100(W) firmware versions 5.00 through 5.21 Patch 1, USG FLEX 200 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 500 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 700 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 50(W) firmware versions 5.10 through 5.21 Patch 1, USG20(W)-VPN firmware versions 5.10 through 5.21 Patch 1, ATP series firmware versions 5.10 through 5.21 Patch 1, VPN series firmware versions 4.60 through 5.21 Patch 1, which could allow an attacker to modify specific files and then execute some OS commands on a vulnerable device.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 22 Oct 2025 09:30:00 +0900


Wed, 22 Oct 2025 05:30:00 +0900


Wed, 22 Oct 2025 04:30:00 +0900


Thu, 30 Jan 2025 02:15:00 +0900

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2022-05-16'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Zyxel

Published:

Updated: 2025-10-21T23:15:39.737Z

Reserved: 2022-05-10T00:00:00.000Z

Link: CVE-2022-30525

cve-icon Vulnrichment

Updated: 2024-08-03T06:48:36.383Z

cve-icon NVD

Status : Analyzed

Published: 2022-05-12T14:15:07.053

Modified: 2025-10-27T17:04:31.950

Link: CVE-2022-30525

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses