An improper check for unusual conditions in Zyxel NWA110AX firmware verisons prior to 6.50(ABTG.0)C0, which could allow a LAN attacker to cause a temporary denial-of-service (DoS) by sending crafted VLAN frames if the MAC address of the vulnerable AP were intercepted by the attacker.
AI analysis not yet available
Plain-English explanation, risk summary, and remediation steps will appear here once AI analysis is complete.
No Fix Known
No patch has been released yet. Apply workarounds or mitigations where available.
| Vendor | Product | Versions | Fixed In |
|---|---|---|---|
| zyxel | nwa110ax_firmware | 6.45\(abtg.0\)c0 | - |
| zyxel | nwa210ax_firmware | 6.45\(abtd.0\)c0 | - |
| zyxel | wax510d_firmware |
Published
CVE disclosed publicly
Last Modified
Most recent update
Indexed to CVEInsight
Added to this platform
AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
6
Affected Products
2
References
zyxel / nwa110ax_firmware
| 6.45\(abtf.0\)c0 |
| - |
| zyxel | wax610d_firmware | 6.45\(abte.0\)c0 | - |
| zyxel | wax630s_firmware | 6.45\(abzd.0\)c0 | - |
| zyxel | wax650s_firmware | 6.45\(abrm.0\)c0 | - |
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Exploitability
Impact