Логотип exploitDog
bind:CVE-2018-10701
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-10701

Количество 3

Количество 3

nvd логотип

CVE-2018-10701

больше 6 лет назад

An issue was discovered on Moxa AWK-3121 1.14 devices. It provides functionality so that an administrator can run scripts on the device to troubleshoot any issues. However, the same functionality allows an attacker to execute commands on the device. The POST parameter "iw_filename" is susceptible to buffer overflow. By crafting a packet that contains a string of 162 characters, it is possible for an attacker to execute the attack.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-78cx-45gm-rh3p

больше 3 лет назад

An issue was discovered on Moxa AWK-3121 1.14 devices. It provides functionality so that an administrator can run scripts on the device to troubleshoot any issues. However, the same functionality allows an attacker to execute commands on the device. The POST parameter "iw_filename" is susceptible to buffer overflow. By crafting a packet that contains a string of 162 characters, it is possible for an attacker to execute the attack.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2020-01236

больше 6 лет назад

Уязвимость микропрограммного обеспечения беспроводной точки доступа для промышленных систем Moxa AWK-3121, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2018-10701

An issue was discovered on Moxa AWK-3121 1.14 devices. It provides functionality so that an administrator can run scripts on the device to troubleshoot any issues. However, the same functionality allows an attacker to execute commands on the device. The POST parameter "iw_filename" is susceptible to buffer overflow. By crafting a packet that contains a string of 162 characters, it is possible for an attacker to execute the attack.

CVSS3: 8.8
1%
Низкий
больше 6 лет назад
github логотип
GHSA-78cx-45gm-rh3p

An issue was discovered on Moxa AWK-3121 1.14 devices. It provides functionality so that an administrator can run scripts on the device to troubleshoot any issues. However, the same functionality allows an attacker to execute commands on the device. The POST parameter "iw_filename" is susceptible to buffer overflow. By crafting a packet that contains a string of 162 characters, it is possible for an attacker to execute the attack.

CVSS3: 8.8
1%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-01236

Уязвимость микропрограммного обеспечения беспроводной точки доступа для промышленных систем Moxa AWK-3121, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
1%
Низкий
больше 6 лет назад

Уязвимостей на страницу