First published: Mon May 14 2018(Updated: )
An exploitable command injection vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted HTTP POST can cause a privilege escalation, resulting in a root shell. An attacker can inject OS commands into the ip= parm in the "/goform/net_WebPingGetValue" URI to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa EDR-810 VPN 2G-SFP Firmware | =4.1 | |
Moxa EDR-810 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12120 is considered critical due to the potential for privilege escalation and command injection.
To fix CVE-2017-12120, update to the latest firmware version provided by Moxa.
CVE-2017-12120 affects Moxa EDR-810 firmware version 4.1.
CVE-2017-12120 enables an attacker to execute OS commands and potentially gain root access.
Yes, CVE-2017-12120 can be exploited through a specially crafted HTTP POST request.