cve/2019/CVE-2019-5142.md

19 lines
1.0 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-5142](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5142)
![](https://img.shields.io/static/v1?label=Product&message=Moxa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20('OS%20Command%20Injection')&color=brighgreen)
### Description
An exploitable command injection vulnerability exists in the hostname functionality of the Moxa AWK-3131A firmware version 1.13. A specially crafted entry to network configuration information can cause execution of arbitrary system commands, resulting in full control of the device. An attacker can send various authenticated requests to trigger this vulnerability.
### POC
#### Reference
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0931
2024-06-09 00:33:16 +00:00
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0931
2024-05-26 14:27:05 +02:00
#### Github
No PoCs found on GitHub currently.