First published: Tue Feb 25 2020(Updated: )
An exploitable command injection vulnerability exists in the iw_webs functionality of the Moxa AWK-3131A firmware version 1.13. A specially crafted iw_serverip parameter can cause user input to be reflected in a subsequent iw_system call, resulting in remote control over the device. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa AWK-3131A firmware | =1.13 | |
Moxa AWK-3131A |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-5141.
The severity of CVE-2019-5141 is high with a severity value of 8.8.
The affected software is Moxa AWK-3131A firmware version 1.13.
This vulnerability allows an attacker to execute arbitrary commands on the affected device by manipulating the iw_serverip parameter.
Yes, upgrading to a fixed version of the Moxa AWK-3131A firmware is recommended to mitigate this vulnerability.