First published: Wed Jul 15 2020(Updated: )
Malicious operation of the crafted web browser cookie may cause a stack-based buffer overflow in the system web server on the EDR-G902 and EDR-G903 Series Routers (versions prior to 5.4).
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Moxa Edr-g902-t Firmware | <=5.4 | |
Moxa Edr-g902-t | ||
Moxa Edr-g902 Firmware | <=5.4 | |
Moxa Edr-g902 | ||
Moxa Edr-g903-t Firmware | <=5.4 | |
Moxa Edr-g903-t | ||
Moxa Edr-g903 Firmware | <=5.4 | |
Moxa EDR-G903 | ||
Moxa EDR-G902 Series: firmware versions 5.4 and prior | ||
Moxa EDR-G903 Series: firmware versions 5.4 and prior |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2020-14511.
The severity level of CVE-2020-14511 is critical (9.8).
The EDR-G902 and EDR-G903 Series Routers (versions prior to 5.4) are affected by CVE-2020-14511.
This vulnerability can be exploited by performing a malicious operation with a crafted web browser cookie, causing a stack-based buffer overflow in the system web server.
Yes, updating the firmware to version 5.4 or higher resolves the vulnerability.