First published: Fri Jun 25 2021(Updated: )
In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in encrypted diagnostic script functionality of the devices. A specially crafted diagnostic script file can cause arbitrary busybox commands to be executed, resulting in remote control over the device. An attacker can send diagnostic while authenticated as a low privilege user to trigger this vulnerability.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
Weidmueller Ie-wl-bl-ap-cl-eu Firmware | <=1.16.18 | |
Weidmueller Ie-wl-bl-ap-cl-eu | ||
Weidmueller Ie-wlt-bl-ap-cl-eu Firmware | <=1.16.18 | |
Weidmueller Ie-wlt-bl-ap-cl-eu | ||
Weidmueller Ie-wl-bl-ap-cl-us Firmware | <=1.16.18 | |
Weidmueller Ie-wl-bl-ap-cl-us | ||
Weidmueller Ie-wlt-bl-ap-cl-us Firmware | <=1.16.18 | |
Weidmueller Ie-wlt-bl-ap-cl-us | ||
Weidmueller Ie-wl-vl-ap-br-cl-eu Firmware | <=1.16.18 | |
Weidmueller Ie-wl-vl-ap-br-cl-eu | ||
Weidmueller Ie-wlt-vl-ap-br-cl-eu Firmware | <=1.16.18 | |
Weidmueller Ie-wlt-vl-ap-br-cl-eu | ||
Weidmueller Ie-wl-vl-ap-br-cl-us Firmware | <=1.16.18 | |
Weidmueller Ie-wl-vl-ap-br-cl-us | ||
Weidmueller Ie-wlt-vl-ap-br-cl-us Firmware | <=1.16.18 | |
Weidmueller Ie-wlt-vl-ap-br-cl-us | ||
Weidmueller Ie-wl-bl-ap-cl-eu Firmware | <=1.11.10 | |
Weidmueller Ie-wlt-bl-ap-cl-eu Firmware | <=1.11.10 | |
Weidmueller Ie-wl-bl-ap-cl-us Firmware | <=1.11.10 | |
Weidmueller Ie-wlt-bl-ap-cl-us Firmware | <=1.11.10 | |
Weidmueller Ie-wl-vl-ap-br-cl-eu Firmware | <=1.11.10 | |
Weidmueller Ie-wlt-vl-ap-br-cl-eu Firmware | <=1.11.10 | |
Weidmueller Ie-wl-vl-ap-br-cl-us Firmware | <=1.11.10 | |
Weidmueller Ie-wlt-vl-ap-br-cl-us Firmware | <=1.11.10 |
For IE-WL(T)-BL-AP-CL-XX versions V1.16.21 (Build 21010513) and greater are fixed. For IE-WL(T)-VL-AP-CL-XX versions V1.11.13 (Build 21010513) and greater are fixed.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-33530.
CVE-2021-33530 has a severity rating of 8.8, which is considered critical.
The following Weidmueller Industrial WLAN devices firmware versions are affected: Ie-wl-bl-ap-cl-eu firmware up to and including 1.16.18, Ie-wlt-bl-ap-cl-eu firmware up to and including 1.16.18, Ie-wl-bl-ap-cl-us firmware up to and including 1.16.18, Ie-wlt-bl-ap-cl-us firmware up to and including 1.16.18, Ie-wl-vl-ap-br-cl-eu firmware up to and including 1.16.18, Ie-wlt-vl-ap-br-cl-eu firmware up to and including 1.16.18, Ie-wl-vl-ap-br-cl-us firmware up to and including 1.16.18, and Ie-wlt-vl-ap-br-cl-us firmware up to and including 1.16.18.
In order to exploit CVE-2021-33530, an attacker would need to craft a specially designed diagnostic script file and have it executed on the vulnerable Weidmueller Industrial WLAN device.
At the moment, there does not appear to be a fix available for CVE-2021-33530. It is recommended to follow the guidance provided by the vendor and stay informed about any updates or patches that may be released.