{"uuid": "d73ad4cd-92f3-4970-9cc4-9d854ca3ac96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-22917", "type": "seen", "source": "https://t.me/cibsecurity/62727", "content": "\u203c CVE-2023-22917 \u203c\n\nA buffer overflow vulnerability in the \u00e2\u20ac\u0153sdwan_iface_ipc\u00e2\u20ac\ufffd binary of Zyxel ATP series firmware versions 5.10 through 5.32, USG FLEX series firmware versions 5.00 through 5.32, USG FLEX 50(W) firmware versions 5.10 through 5.32, USG20(W)-VPN firmware versions 5.10 through 5.32, and VPN series firmware versions 5.00 through 5.35, which could allow a remote unauthenticated attacker to cause a core dump with a request error message on a vulnerable device by uploading a crafted configuration file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-24T20:19:27.000000Z"}