![]() A command injection vulnerability caused by improper filtering for the parameters in a CGI program was also identified. Users are advised to install it for optimal protection.Ī directory traversal vulnerability caused by specific character sequences within an improperly sanitized URL was identified in the VPN2S firewall. Zyxel has released a patch addressing directory traversal and command injection vulnerabilities in the VPN2S firewall. ![]() ![]() Zyxel security advisory for directory traversal and command injection vulnerabilities of VPN2S firewall
0 Comments
Leave a Reply. |