A OS command injection vulnerability in the CGI program of Zyxel USG FLEX 100(W) firmware versions 5.00 through 5.21 Patch 1, USG FLEX 200 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 500 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 700 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 50(W) firmware versions 5.10 through 5.21 Patch 1, USG20(W)-VPN firmware versions 5.10 through 5.21 Patch 1, ATP series firmware versions 5.10 through 5.21 Patch 1, VPN series firmware versions 4.60 through 5.21 Patch 1, which could allow an attacker to modify specific files and then execute some OS commands on a vulnerable device.
- http://packetstormsecurity.com/files/167176/Zyxel-Remote-Command-Execution.html
- http://packetstormsecurity.com/files/167182/Zyxel-Firewall-ZTP-Unauthenticated-Command-Injection.html
- http://packetstormsecurity.com/files/167372/Zyxel-USG-FLEX-5.21-Command-Injection.html
- http://packetstormsecurity.com/files/168202/Zyxel-Firewall-SUID-Binary-Privilege-Escalation.html
- https://github.com/20142995/Goby
- https://github.com/20142995/nuclei-templates
- https://github.com/20142995/pocsuite3
- https://github.com/5l1v3r1/CVE-2022-30525-Reverse-Shell
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/Chocapikk/CVE-2022-30525-Reverse-Shell
- https://github.com/ExploitPwner/CVE-2022-30525-Zyxel-Mass-Exploiter
- https://github.com/Fans0n-Fan/Awesome-IoT-exp
- https://github.com/Henry4E36/CVE-2022-30525
- https://github.com/HimmelAward/Goby_POC
- https://github.com/M4fiaB0y/CVE-2022-30525
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/NyxAzrael/Goby_POC
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/ProngedFork/CVE-2022-30525
- https://github.com/PyterSmithDarkGhost/EXPLOITCVE202230525
- https://github.com/SYRTI/POC_to_review
- https://github.com/W01fh4cker/Serein
- https://github.com/WhooAmii/POC_to_review
- https://github.com/YGoldking/CVE-2022-30525
- https://github.com/Z0fhack/Goby_POC
- https://github.com/ZWDeJun/ZWDeJun
- https://github.com/arajsingh-infosec/CVE-2022-30525_Exploit
- https://github.com/badboycxcc/script
- https://github.com/bigblackhat/oFx
- https://github.com/cbk914/CVE-2022-30525_check
- https://github.com/d-rn/vulBox
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/defronixpro/Defronix-Cybersecurity-Roadmap
- https://github.com/furkanzengin/CVE-2022-30525
- https://github.com/gotr00t0day/valhalla
- https://github.com/hktalent/bug-bounty
- https://github.com/iveresk/cve-2022-30525
- https://github.com/jbaines-r7/victorian_machinery
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/k0sf/CVE-2022-30525
- https://github.com/karimhabush/cyberowl
- https://github.com/kuznyJan1972/CVE-2022-30525-mass
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/luck-ying/Library-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/merlinepedra/AttackWebFrameworkTools-5.0
- https://github.com/merlinepedra25/AttackWebFrameworkTools-5.0
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
- https://github.com/peiqiF4ck/WebFrameworkTools-5.5
- https://github.com/peiqiF4ck/WebFrameworkTools-5.5-enhance
- https://github.com/savior-only/CVE-2022-30525
- https://github.com/shengshengli/AttackWebFrameworkTools-5.0
- https://github.com/shuai06/CVE-2022-30525
- https://github.com/superzerosec/CVE-2022-30525
- https://github.com/superzerosec/poc-exploit-index
- https://github.com/tanjiti/sec_profile
- https://github.com/trhacknon/CVE-2022-30525-Reverse-Shell
- https://github.com/trhacknon/Pocingit
- https://github.com/wasp76b/oneliner
- https://github.com/west9b/CVE-2022-30525
- https://github.com/west9b/F5-BIG-IP-POC
- https://github.com/whoforget/CVE-POC
- https://github.com/xanszZZ/pocsuite3-poc
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/youwizard/CVE-POC
- https://github.com/zecool/cve
- https://github.com/zhefox/CVE-2022-30525-Reverse-Shell