### [CVE-2019-5184](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5184) ![](https://img.shields.io/static/v1?label=Product&message=Wago&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=double-free&color=brighgreen) ### Description An exploitable double free vulnerability exists in the iocheckd service "I/O-Check" functionality of WAGO PFC 200. A specially crafted XML cache file written to a specific location on the device can cause a heap pointer to be freed twice, resulting in a denial of service and potentially code execution. An attacker can send a specially crafted packet to trigger the parsing of this cache file. ### POC #### Reference - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0965 #### Github No PoCs found on GitHub currently.