Description
An exploitable OS Command Injection vulnerability exists in the web application 'ping' functionality of Moxa AWK-3131A Wireless Access Points running firmware 1.1. Specially crafted web form input can cause an OS Command Injection resulting in complete compromise of the vulnerable device. An attacker can exploit this vulnerability remotely.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2016-9560 | An exploitable OS Command Injection vulnerability exists in the web application 'ping' functionality of Moxa AWK-3131A Wireless Access Points running firmware 1.1. Specially crafted web form input can cause an OS Command Injection resulting in complete compromise of the vulnerable device. An attacker can exploit this vulnerability remotely. |
References
| Link | Providers |
|---|---|
| http://www.talosintelligence.com/reports/TALOS-2016-0235/ |
|
History
No history.
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2024-08-06T02:27:41.340Z
Reserved: 2016-10-17T00:00:00.000Z
Link: CVE-2016-8721
No data.
Status : Deferred
Published: 2017-04-20T18:59:01.577
Modified: 2025-04-20T01:37:25.860
Link: CVE-2016-8721
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD