Command Execution Vulnerability in Moxa AWK-3121 Devices
CVE-2018-10701

8.8HIGH

Key Information:

Vendor
Moxa
Vendor
CVE Published:
7 June 2019

Summary

On Moxa AWK-3121 devices running version 1.14, a vulnerability exists that allows an attacker to exploit the device's script execution functionality. This flaw is due to the improper handling of the POST parameter 'iw_filename', which is prone to buffer overflow. An attacker can craft a specially formatted packet containing a string of 162 characters, potentially leading to unauthorized command execution on the device. This issue highlights the critical need for robust security measures in IoT devices.

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.