An exploitable OS Command Injection vulnerability exists in the Telnet, SSH, and console login functionality of Moxa AWK-3131A Industrial IEEE 802.11a/b/g/n wireless AP/bridge/client in firmware versions 1.4 to 1.7 (current). An attacker can inject commands via the username parameter of several services (SSH, Telnet, console), resulting in remote, unauthenticated, root-level operating system command execution.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published:

Updated: 2024-09-16T23:55:35.997Z

Reserved: 2017-09-13T00:00:00

Link: CVE-2017-14459

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-04-11T16:29:00.213

Modified: 2024-11-21T03:12:50.197

Link: CVE-2017-14459

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses