Description
An exploitable OS Command Injection vulnerability exists in the Telnet, SSH, and console login functionality of Moxa AWK-3131A Industrial IEEE 802.11a/b/g/n wireless AP/bridge/client in firmware versions 1.4 to 1.7 (current). An attacker can inject commands via the username parameter of several services (SSH, Telnet, console), resulting in remote, unauthenticated, root-level operating system command execution.
Published: 2018-04-11
Score: 10 Critical
EPSS: 19.8% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

No history.

Subscriptions

Moxa Awk-3131a Awk-3131a Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published:

Updated: 2024-09-16T23:55:35.997Z

Reserved: 2017-09-13T00:00:00.000Z

Link: CVE-2017-14459

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-04-11T16:29:00.213

Modified: 2024-11-21T03:12:50.197

Link: CVE-2017-14459

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses