Description
An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function of the WAGO PFC 200 Firmware version 03.02.02(14). An attacker can send specially crafted packet at 0x1ea48 to the extracted hostname value from the xml file that is used as an argument to /etc/config-tools/config_interfaces interface=X1 state=enabled ip-address=<contents of ip node> using sprintf().
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-14776 | An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function of the WAGO PFC 200 Firmware version 03.02.02(14). An attacker can send specially crafted packet at 0x1ea48 to the extracted hostname value from the xml file that is used as an argument to /etc/config-tools/config_interfaces interface=X1 state=enabled ip-address=<contents of ip node> using sprintf(). |
References
History
No history.
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2024-08-04T19:47:56.680Z
Reserved: 2019-01-04T00:00:00.000Z
Link: CVE-2019-5171
No data.
Status : Modified
Published: 2020-03-12T00:15:18.087
Modified: 2024-11-21T04:44:29.173
Link: CVE-2019-5171
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD