First published: Tue Feb 25 2020(Updated: )
An exploitable command injection vulnerability exists in the iwwebs functionality of the Moxa AWK-3131A firmware version 1.13. A specially crafted diagnostic script file name can cause user input to be reflected in a subsequent iwsystem call, resulting in remote control over the device. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa AWK-3131A firmware | =1.13 | |
Moxa AWK-3131A |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-5140 is a command injection vulnerability in the iwwebs functionality of the Moxa AWK-3131A firmware version 1.13.
CVE-2019-5140 has a severity rating of 8.8, which is considered high.
CVE-2019-5140 allows an attacker to execute arbitrary commands on the device by exploiting a command injection vulnerability in the iwwebs functionality of the Moxa AWK-3131A firmware.
A fix for CVE-2019-5140 is not available at the moment. It is recommended to apply security patches or updates from the vendor when they become available.
Yes, you can find more information about CVE-2019-5140 at the following reference: https://talosintelligence.com/vulnerability_reports/TALOS-2019-0929