### [CVE-2017-12120](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12120) ![](https://img.shields.io/static/v1?label=Product&message=Moxa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=command%20injection&color=brighgreen) ### Description An exploitable command injection vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted HTTP POST can cause a privilege escalation, resulting in a root shell. An attacker can inject OS commands into the ip= parm in the "/goform/net_WebPingGetValue" URI to trigger this vulnerability. ### POC #### Reference - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0472 #### Github No PoCs found on GitHub currently.