An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function of the WAGO PFC 200 Firmware version 03.02.02(14). An attacker can send specially crafted packet at 0x1ea48 to the extracted hostname value from the xml file that is used as an argument to /etc/config-tools/config_interfaces interface=X1 state=enabled ip-address=<contents of ip node> using sprintf().
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published: 2020-03-11T23:17:48

Updated: 2024-08-04T19:47:56.680Z

Reserved: 2019-01-04T00:00:00

Link: CVE-2019-5171

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2020-03-12T00:15:18.087

Modified: 2020-03-17T18:14:24.410

Link: CVE-2019-5171

cve-icon Redhat

No data.