Description
An exploitable HTTP Header Injection vulnerability exists in the Web Application functionality of the Moxa AWK-3131A Wireless Access Point running firmware 1.1. A specially crafted HTTP request can inject a payload in the bkpath parameter which will be copied in to Location header of the HTTP response.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2016-9559 | An exploitable HTTP Header Injection vulnerability exists in the Web Application functionality of the Moxa AWK-3131A Wireless Access Point running firmware 1.1. A specially crafted HTTP request can inject a payload in the bkpath parameter which will be copied in to Location header of the HTTP response. |
References
| Link | Providers |
|---|---|
| http://www.talosintelligence.com/reports/TALOS-2016-0234/ |
|
History
No history.
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2024-08-06T02:27:41.299Z
Reserved: 2016-10-17T00:00:00.000Z
Link: CVE-2016-8720
No data.
Status : Deferred
Published: 2017-04-13T19:59:00.237
Modified: 2025-04-20T01:37:25.860
Link: CVE-2016-8720
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD