Bug Bounty Platform Vulnerability Allows Arbitrary Code Execution
CVE-2024-9139

7.2HIGH

Key Information:

Vendor
Moxa
Vendor
CVE Published:
14 October 2024

Summary

The vulnerability allows for OS command injection due to improperly restricted commands in Moxa's network security appliances. This oversight permits attackers to execute arbitrary code on the affected systems, potentially compromising the integrity and availability of services. Attack vectors may involve sending specially crafted inputs that the application erroneously processes, leading to unauthorized command execution. Organizations utilizing Moxa routers and network security appliances should address this vulnerability promptly to mitigate risks associated with potential exploitation.

Affected Version(s)

EDF-G1002-BP Series 1.0 <= 3.12.1

EDR-8010 Series 1.0 <= 3.12.1

EDR-810 Series 1.0 <= 5.12.33

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

Credit

Lars Haulin
.