Command Injection Vulnerability in WAGO PFC 200 Firmware
CVE-2019-5169

7.8HIGH

Key Information:

Vendor
Wago
Vendor
CVE Published:
12 March 2020

Summary

A command injection vulnerability affects the WAGO PFC 200 Firmware version 03.02.02(14), allowing an attacker to execute arbitrary OS commands. The vulnerability arises from the iocheckd service’s I/O-Check function, which fails to properly sanitize inputs. By sending a meticulously crafted XML cache file to the device's specified location, an attacker can manipulate the system into executing commands defined within the crafted file. This exploitation occurs during the processing of the cache file, where the unsanitized gateway value is passed as an argument in a command execution context. As a result, unauthorized actions can be executed on the affected device.

Affected Version(s)

WAGO PFC200 Firmware version 03.02.02(14)

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.