CVE-2018-10702

An issue was discovered on Moxa AWK-3121 1.14 devices. It provides functionality so that an administrator can run scripts on the device to troubleshoot any issues. However, the same functionality allows an attacker to execute commands on the device. The POST parameter "iw_filename" is susceptible to command injection via shell metacharacters.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:moxa:awk-3121_firmware:1.14:*:*:*:*:*:*:*
cpe:2.3:h:moxa:awk-3121:-:*:*:*:*:*:*:*

History

28 Feb 2023, 19:29

Type Values Removed Values Added
References (MISC) http://packetstormsecurity.com/files/153223/Moxa-AWK-3121-1.14-Information-Disclosure-Command-Execution.html - (MISC) http://packetstormsecurity.com/files/153223/Moxa-AWK-3121-1.14-Information-Disclosure-Command-Execution.html - Exploit, Third Party Advisory, VDB Entry

Information

Published : 2019-06-07 20:29

Updated : 2023-12-10 12:59


NVD link : CVE-2018-10702

Mitre link : CVE-2018-10702

CVE.ORG link : CVE-2018-10702


JSON object : View

Products Affected

moxa

  • awk-3121_firmware
  • awk-3121
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')