{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-14T17:57:22.430","vulnerabilities":[{"cve":{"id":"CVE-2017-18368","sourceIdentifier":"cve@mitre.org","published":"2019-05-02T17:29:00.287","lastModified":"2025-11-05T19:23:50.730","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"The ZyXEL P660HN-T1A v1 TCLinux Fw $7.3.15.0 v001 \/ 3.40(ULM.0)b31 router distributed by TrueOnline has a command injection vulnerability in the Remote System Log forwarding function, which is accessible by an unauthenticated user. The vulnerability is in the ViewLog.asp page and can be exploited through the remote_host parameter."},{"lang":"es","value":"El router P660HN-T1A v1 TCLinux Fw $7.3.15.0 v001 \/ 3.40(ULM.0)b31 de ZyXEL distribuido por TrueOnline tiene una vulnerabilidad de inyección de comandos en la función de reenvío de registro del sistema remoto (Remote System Log forwarding), que es accesible por un usuario identificado. La vulnerabilidad está en la página ViewLog.asp y puede ser aprovechada por medio del parámetro remote_host."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:H\/I:H\/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:H\/I:H\/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N\/AC:L\/Au:N\/C:C\/I:C\/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"cisaExploitAdd":"2023-08-07","cisaActionDue":"2023-08-28","cisaRequiredAction":"Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.","cisaVulnerabilityName":"Zyxel P660HN-T1A Routers Command Injection Vulnerability","weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-78"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:billion:5200w-t_firmware:7.3.8.0:*:*:*:*:*:*:*","matchCriteriaId":"C756E02F-45B7-4F40-AEEC-DCC334023F8B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:billion:5200w-t:-:*:*:*:*:*:*:*","matchCriteriaId":"B8F97C92-C53D-4578-92ED-9327E3646FDB"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:zyxel:p660hn-t1a_v2_firmware:7.3.15.0:*:*:*:*:*:*:*","matchCriteriaId":"345E3D41-AF56-47DA-9719-E84FB9DB300B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:zyxel:p660hn-t1a_v2:-:*:*:*:*:*:*:*","matchCriteriaId":"1C6D563A-3210-4459-BE4D-5CC36CAF6784"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:zyxel:p660hn-t1a_v1_firmware:7.3.15.0:*:*:*:*:*:*:*","matchCriteriaId":"BB423D04-654A-4FD5-8973-17E5B08C7453"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:zyxel:p660hn-t1a_v1:-:*:*:*:*:*:*:*","matchCriteriaId":"3AF29B50-0AE2-444C-A251-C27DEBDC064B"}]}]}],"references":[{"url":"http:\/\/www.zyxel.com\/support\/announcement_unauthenticated.shtml","source":"cve@mitre.org","tags":["Broken Link"]},{"url":"https:\/\/raw.githubusercontent.com\/pedrib\/PoC\/master\/advisories\/zyxel_trueonline.txt","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https:\/\/seclists.org\/fulldisclosure\/2017\/Jan\/40","source":"cve@mitre.org","tags":["Exploit","Mailing List","Third Party Advisory"]},{"url":"https:\/\/ssd-disclosure.com\/index.php\/archives\/2910","source":"cve@mitre.org","tags":["Exploit","Technical Description","Third Party Advisory"]},{"url":"https:\/\/unit42.paloaltonetworks.com\/new-mirai-variant-targets-enterprise-wireless-presentation-display-systems\/","source":"cve@mitre.org","tags":["Technical Description","Third Party Advisory"]},{"url":"http:\/\/www.zyxel.com\/support\/announcement_unauthenticated.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]},{"url":"https:\/\/raw.githubusercontent.com\/pedrib\/PoC\/master\/advisories\/zyxel_trueonline.txt","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]},{"url":"https:\/\/seclists.org\/fulldisclosure\/2017\/Jan\/40","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Mailing List","Third Party Advisory"]},{"url":"https:\/\/ssd-disclosure.com\/index.php\/archives\/2910","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Technical Description","Third Party Advisory"]},{"url":"https:\/\/unit42.paloaltonetworks.com\/new-mirai-variant-targets-enterprise-wireless-presentation-display-systems\/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Technical Description","Third Party Advisory"]},{"url":"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-18368","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"]}]}}]}