Command Execution Vulnerability in Moxa AWK-3121 Devices
CVE-2018-10701
8.8HIGH
Summary
On Moxa AWK-3121 devices running version 1.14, a vulnerability exists that allows an attacker to exploit the device's script execution functionality. This flaw is due to the improper handling of the POST parameter 'iw_filename', which is prone to buffer overflow. An attacker can craft a specially formatted packet containing a string of 162 characters, potentially leading to unauthorized command execution on the device. This issue highlights the critical need for robust security measures in IoT devices.
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved