A stack-based buffer overflow in the built-in web server in Moxa NPort W2150A/W2250A Series firmware version 2.3 and prior allows a remote attacker to exploit the vulnerability by sending crafted payload to the web service. Successful exploitation of the vulnerability could result in denial of service.
Subscriptions
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-16987 | A stack-based buffer overflow in the built-in web server in Moxa NPort W2150A/W2250A Series firmware version 2.3 and prior allows a remote attacker to exploit the vulnerability by sending crafted payload to the web service. Successful exploitation of the vulnerability could result in denial of service. |
Fixes
Solution
Moxa has developed appropriate solutions to address the vulnerabilities. The solutions for affected products are shown below. * NPort W2150A/W2250A Series: Please contact Moxa Technical Support for a security patch.
Workaround
No workaround given by the vendor.
References
History
Tue, 25 Feb 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Moxa
Moxa nport W2150a Moxa nport W2150a-t Moxa nport W2150a-t Firmware Moxa nport W2150a Firmware Moxa nport W2250a Moxa nport W2250a-t Moxa nport W2250a-t Firmware Moxa nport W2250a Firmware |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:h:moxa:nport_w2150a-t:-:*:*:*:*:*:*:* cpe:2.3:h:moxa:nport_w2150a:-:*:*:*:*:*:*:* cpe:2.3:h:moxa:nport_w2250a-t:-:*:*:*:*:*:*:* cpe:2.3:h:moxa:nport_w2250a:-:*:*:*:*:*:*:* cpe:2.3:o:moxa:nport_w2150a-t_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:nport_w2150a_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:nport_w2250a-t_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:nport_w2250a_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Moxa
Moxa nport W2150a Moxa nport W2150a-t Moxa nport W2150a-t Firmware Moxa nport W2150a Firmware Moxa nport W2250a Moxa nport W2250a-t Moxa nport W2250a-t Firmware Moxa nport W2250a Firmware |
Status: PUBLISHED
Assigner: Moxa
Published:
Updated: 2024-08-23T20:33:09.565Z
Reserved: 2024-02-05T03:40:25.552Z
Link: CVE-2024-1220
Updated: 2024-08-01T18:33:25.284Z
Status : Analyzed
Published: 2024-03-06T02:15:44.810
Modified: 2025-02-25T17:42:20.793
Link: CVE-2024-1220
No data.
OpenCVE Enrichment
No data.
EUVD