cve/2019/CVE-2019-5173.md
2024-06-18 02:51:15 +02:00

18 lines
1.1 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### [CVE-2019-5173](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5173)
![](https://img.shields.io/static/v1?label=Product&message=WAGO%20PFC200&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=command%20injection&color=brighgreen)
### Description
An exploitable command injection vulnerability exists in the iocheckd service I/O-Check function of the WAGO PFC 200 Firmware version 03.02.02(14). A specially crafted XML cache file written to a specific location on the device can be used to inject OS commands. An attacker can send a specially crafted packet to trigger the parsing of this cache file. At 0x1e9fc the extracted state value from the xml file is used as an argument to /etc/config-tools/config_interfaces interface=X1 state=<contents of state node> using sprintf(). This command is later executed via a call to system().
### POC
#### Reference
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0962
#### Github
No PoCs found on GitHub currently.