INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Enterprise Software and Database Management CRITICAL 1h Global vulnerability Information Technology CRITICAL 2h Global malware Financial Services HIGH 2h Global vulnerability Technology/Software CRITICAL 3h Global vulnerability Information Technology HIGH 3h Global data_breach Government CRITICAL 12h Global ransomware Financial Services / Cybersecurity CRITICAL 13h Global vulnerability Information Technology / Cybersecurity CRITICAL 15h Global malware Energy and Utilities CRITICAL 16h Global ransomware Multiple sectors CRITICAL 16h Global vulnerability Enterprise Software and Database Management CRITICAL 1h Global vulnerability Information Technology CRITICAL 2h Global malware Financial Services HIGH 2h Global vulnerability Technology/Software CRITICAL 3h Global vulnerability Information Technology HIGH 3h Global data_breach Government CRITICAL 12h Global ransomware Financial Services / Cybersecurity CRITICAL 13h Global vulnerability Information Technology / Cybersecurity CRITICAL 15h Global malware Energy and Utilities CRITICAL 16h Global ransomware Multiple sectors CRITICAL 16h Global vulnerability Enterprise Software and Database Management CRITICAL 1h Global vulnerability Information Technology CRITICAL 2h Global malware Financial Services HIGH 2h Global vulnerability Technology/Software CRITICAL 3h Global vulnerability Information Technology HIGH 3h Global data_breach Government CRITICAL 12h Global ransomware Financial Services / Cybersecurity CRITICAL 13h Global vulnerability Information Technology / Cybersecurity CRITICAL 15h Global malware Energy and Utilities CRITICAL 16h Global ransomware Multiple sectors CRITICAL 16h
Vulnerabilities

CVE-2017-18368

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Zyxel P660HN-T1A Routers Command Injection Vulnerability — Zyxel P660HN-T1A routers contain a command injection vulnerability in the Remote System Log forwarding function, which is accessible by an un
Published: Aug 7, 2023  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Zyxel P660HN-T1A Routers Command Injection Vulnerability — Zyxel P660HN-T1A routers contain a command injection vulnerability in the Remote System Log forwarding function, which is accessible by an unauthenticated user and exploited via the remote_host parameter of the ViewLog.asp page.

🤖 AI Executive Summary

CVE-2017-18368 is a critical command injection vulnerability in Zyxel P660HN-T1A routers that allows unauthenticated remote attackers to execute arbitrary commands via the remote_host parameter in the ViewLog.asp page. This vulnerability has a CVSS score of 9.0 and known exploits are actively available in the wild, including use by the Mirai botnet variants. The vulnerability requires no authentication, making it trivially exploitable by any attacker with network access to the router's management interface. Organizations using these legacy routers face immediate risk of device compromise, botnet recruitment, and lateral movement into internal networks.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 8, 2026 07:11
🇸🇦 Saudi Arabia Impact Assessment
This vulnerability poses significant risk to Saudi organizations, particularly in the telecom sector (STC, Mobily, Zain) and ISPs that may have deployed Zyxel P660HN-T1A routers as CPE (Customer Premises Equipment) for residential and small business customers. Government entities and small-to-medium enterprises across Saudi Arabia that rely on legacy networking equipment are at high risk. The energy sector (ARAMCO, SABIC) and banking sector (SAMA-regulated institutions) could be impacted if these routers exist in branch offices or remote facilities. Given that Mirai botnet variants actively exploit this vulnerability, compromised devices in Saudi Arabia could be weaponized for DDoS attacks against critical national infrastructure or used as pivot points for deeper network intrusion.
🏢 Affected Saudi Sectors
Telecommunications Government Banking Energy Healthcare Education Small and Medium Enterprises
⚖️ Saudi Risk Score (AI)
9.2
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Identify all Zyxel P660HN-T1A routers in your network inventory immediately
2. Restrict access to the web management interface (ViewLog.asp) from untrusted networks using firewall rules
3. Block external access to port 80/443 on these devices at the perimeter firewall

PATCHING GUIDANCE:
4. Update firmware to the latest available version from Zyxel (firmware v3.40(ULM.0)b31 or later addresses this issue)
5. If firmware update is not possible, plan immediate replacement of these end-of-life devices with supported alternatives

COMPENSATING CONTROLS:
6. Place vulnerable routers behind a separate VLAN with strict access controls
7. Implement network segmentation to limit blast radius if a device is compromised
8. Deploy IDS/IPS rules to detect command injection attempts targeting ViewLog.asp
9. Monitor for unusual outbound traffic patterns indicative of botnet C2 communication

DETECTION RULES:
10. Create alerts for HTTP requests containing 'ViewLog.asp' with suspicious remote_host parameter values (e.g., containing semicolons, pipes, backticks)
11. Monitor for unexpected DNS queries or outbound connections from router management IPs
12. Implement Snort/Suricata rule: alert http any any -> any any (msg:"Zyxel P660HN-T1A Command Injection Attempt"; content:"ViewLog.asp"; content:"remote_host"; pcre:"/remote_host=.*[;|`$]/";)
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تحديد جميع أجهزة التوجيه Zyxel P660HN-T1A في جرد الشبكة فوراً
2. تقييد الوصول إلى واجهة الإدارة عبر الويب (ViewLog.asp) من الشبكات غير الموثوقة باستخدام قواعد جدار الحماية
3. حظر الوصول الخارجي إلى المنفذ 80/443 على هذه الأجهزة عند جدار الحماية المحيطي

إرشادات التصحيح:
4. تحديث البرنامج الثابت إلى أحدث إصدار متاح من Zyxel (الإصدار v3.40(ULM.0)b31 أو أحدث يعالج هذه المشكلة)
5. إذا لم يكن تحديث البرنامج الثابت ممكناً، خطط لاستبدال هذه الأجهزة المنتهية الدعم فوراً ببدائل مدعومة

الضوابط التعويضية:
6. وضع الأجهزة المعرضة للخطر خلف شبكة VLAN منفصلة مع ضوابط وصول صارمة
7. تنفيذ تجزئة الشبكة للحد من نطاق الضرر في حالة اختراق الجهاز
8. نشر قواعد IDS/IPS للكشف عن محاولات حقن الأوامر التي تستهدف ViewLog.asp
9. مراقبة أنماط حركة المرور الصادرة غير العادية التي تشير إلى اتصالات التحكم والسيطرة لشبكات الروبوت

قواعد الكشف:
10. إنشاء تنبيهات لطلبات HTTP التي تحتوي على 'ViewLog.asp' مع قيم معلمة remote_host مشبوهة
11. مراقبة استعلامات DNS غير المتوقعة أو الاتصالات الصادرة من عناوين IP لإدارة أجهزة التوجيه
12. تنفيذ قواعد Snort/Suricata للكشف عن محاولات الاستغلال
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC 2-3-1 (Asset Management) ECC 2-5-1 (Network Security) ECC 2-5-2 (Network Security Monitoring) ECC 2-6-1 (Vulnerability Management) ECC 2-13-1 (Cybersecurity Incident Management)
🔵 SAMA CSF
3.3.3 (Patch Management) 3.3.4 (Vulnerability Management) 3.3.5 (Network Security) 3.3.7 (Infrastructure Security) 3.4.1 (Cybersecurity Event Management)
🟡 ISO 27001:2022
A.8.8 (Management of technical vulnerabilities) A.8.9 (Configuration management) A.8.20 (Networks security) A.8.21 (Security of network services) A.8.22 (Segregation of networks)
🟣 PCI DSS v4.0
Requirement 1.3 (Network access controls) Requirement 2.2 (Secure system configurations) Requirement 6.3 (Security vulnerabilities identification and remediation) Requirement 11.3 (Vulnerability scanning)
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Zyxel:P660HN-T1A Routers
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS93.74%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2023-08-28
Published 2023-08-07
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
9.2
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.