### [CVE-2019-10963](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10963) ![](https://img.shields.io/static/v1?label=Product&message=Moxa%20EDR%20810&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=USE%20OF%20HARD-CODED%20CRYPTOGRAPHIC%20KEY%20CWE-321&color=brighgreen) ### Description Moxa EDR 810, all versions 5.1 and prior, allows an unauthenticated attacker to be able to retrieve some log files from the device, which may allow sensitive information disclosure. Log files must have previously been exported by a legitimate user. ### POC #### Reference - http://packetstormsecurity.com/files/154943/Moxa-EDR-810-Command-Injection-Information-Disclosure.html - http://packetstormsecurity.com/files/154943/Moxa-EDR-810-Command-Injection-Information-Disclosure.html #### Github No PoCs found on GitHub currently.