Zyxel security advisory for post-authentication command injection vulnerability in NBG6604 home router

CVE: CVE-2023-22919

Zyxel has released a patch addressing a post-authentication command injection vulnerability in the NBG6604 home router. Users are advised to install the patch for optimal protection.

What is the vulnerability?

The post-authentication command injection vulnerability in Zyxel's NBG6604 could allow an authenticated attacker to execute some OS commands remotely by sending a crafted HTTP request. Note that WAN access is disabled by default on the home router.

What versions are vulnerable—and what should you do?

After a thorough investigation, we’ve identified only one vulnerable product that is within the vulnerability support period and released a firmware patch to address the issue, as shown in the table below.

Affected model Affected version Patch availability
NBG6604 V1.01(ABIR.0)C0 V1.01(ABIR.1)C0
Got a question?

Please contact your local service rep or visit Zyxel’s Community for further information or assistance.


Thanks to Xianjun Chen from Qihoo 360 for reporting the issue to us.

Revision history

2023-5-2: Initial release.