First published: Tue Feb 25 2020(Updated: )
An exploitable remote code execution vulnerability exists in the iw_webs configuration parsing functionality of the Moxa AWK-3131A firmware version 1.13. A specially crafted user name entry can cause an overflow of an error message buffer, resulting in remote code execution. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa AWK-3131A firmware | =1.13 | |
Moxa AWK-3131A |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-5153 is a remote code execution vulnerability in the iw_webs configuration parsing functionality of the Moxa AWK-3131A firmware version 1.13.
CVE-2019-5153 has a severity rating of 8.8 (Critical).
The Moxa AWK-3131A firmware version 1.13 is affected by CVE-2019-5153.
CVE-2019-5153 can be exploited by sending a specially crafted user name entry that causes an overflow of an error message buffer, leading to remote code execution.
It is recommended to update to a patched version of the Moxa AWK-3131A firmware to mitigate the vulnerability.