An exploitable OS Command Injection vulnerability exists in the Telnet, SSH, and console login functionality of Moxa AWK-3131A Industrial IEEE 802.11a/b/g/n wireless AP/bridge/client in firmware versions 1.4 to 1.7 (current). An attacker can inject commands via the username parameter of several services (SSH, Telnet, console), resulting in remote, unauthenticated, root-level operating system command execution.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2024-09-16T23:55:35.997Z
Reserved: 2017-09-13T00:00:00
Link: CVE-2017-14459
No data.
Status : Modified
Published: 2018-04-11T16:29:00.213
Modified: 2024-11-21T03:12:50.197
Link: CVE-2017-14459
No data.
OpenCVE Enrichment
No data.
Weaknesses