Description
An exploitable OS Command Injection vulnerability exists in the Telnet, SSH, and console login functionality of Moxa AWK-3131A Industrial IEEE 802.11a/b/g/n wireless AP/bridge/client in firmware versions 1.4 to 1.7 (current). An attacker can inject commands via the username parameter of several services (SSH, Telnet, console), resulting in remote, unauthenticated, root-level operating system command execution.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
No history.
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2024-09-16T23:55:35.997Z
Reserved: 2017-09-13T00:00:00.000Z
Link: CVE-2017-14459
No data.
Status : Modified
Published: 2018-04-11T16:29:00.213
Modified: 2024-11-21T03:12:50.197
Link: CVE-2017-14459
No data.
OpenCVE Enrichment
No data.
Weaknesses