First published: Thu Apr 13 2017(Updated: )
An exploitable null pointer dereference exists in the Web Application functionality of Moxa AWK-3131A Wireless Access Point running firmware 1.1. Any HTTP GET request not preceded by an '/' will cause a segmentation fault in the web server. An attacker can send any of a multitude of potentially unexpected HTTP get requests to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa AWK-3131A firmware | =1.1 | |
Moxa AWK-3131A |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-8723 is classified as a high severity vulnerability due to the potential for remote exploitation leading to a denial of service.
To mitigate CVE-2016-8723, update the Moxa AWK-3131A firmware to a version newer than 1.1 that addresses this vulnerability.
CVE-2016-8723 can be exploited through HTTP GET requests that are not correctly formatted with a preceding '/'.
CVE-2016-8723 affects devices running Moxa AWK-3131A firmware version 1.1.
Exploiting CVE-2016-8723 can lead to a segmentation fault in the web server, causing it to crash and become unavailable.