First published: Tue Feb 25 2020(Updated: )
An exploitable command injection vulnerability exists in encrypted diagnostic script functionality of the Moxa AWK-3131A firmware version 1.13. A specially crafted diagnostic script file can cause arbitrary busybox commands to be executed, resulting in remote control over the device. An attacker can send diagnostic while authenticated as a low privilege user to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa AWK-3131A firmware | =1.13 | |
Moxa AWK-3131A |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2019-5138.
CVE-2019-5138 has a severity rating of critical, with a score of 9.9.
The affected software is the Moxa AWK-3131A firmware version 1.13.
The vulnerability allows for command injection in the encrypted diagnostic script functionality of the Moxa AWK-3131A firmware version 1.13, enabling execution of arbitrary commands and remote control over the device.
Yes, you can find more information about this vulnerability at the following reference: [Talos Intelligence - TALOS-2019-0927](https://talosintelligence.com/vulnerability_reports/TALOS-2019-0927).