### [CVE-2017-14433](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14433) ![](https://img.shields.io/static/v1?label=Product&message=Moxa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=command%20injection&color=brighgreen) ### Description An exploitable command injection vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted HTTP POST can cause a privilege escalation resulting in root shell. An attacker can inject OS commands into the remoteNetwork0= parameter in the "/goform/net\_Web\_get_value" uri to trigger this vulnerability. ### POC #### Reference - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0482 #### Github No PoCs found on GitHub currently.