An exploitable command injection vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted HTTP POST can cause a privilege escalation resulting in root shell. An attacker can inject OS commands into the openvpnServer0_tmp= parameter in the "/goform/net\_Web\_get_value" uri to trigger this vulnerability.
Advisories
Source ID Title
EUVD EUVD EUVD-2017-5935 An exploitable command injection vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted HTTP POST can cause a privilege escalation resulting in root shell. An attacker can inject OS commands into the openvpnServer0_tmp= parameter in the "/goform/net\_Web\_get_value" uri to trigger this vulnerability.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published:

Updated: 2024-09-16T17:54:38.060Z

Reserved: 2017-09-13T00:00:00

Link: CVE-2017-14432

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-05-14T20:29:00.687

Modified: 2024-11-21T03:12:47.093

Link: CVE-2017-14432

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses