Moxa.AWK-313A.Login.Username.Param.OS.Command.Injection

description-logoDescription

This indicates an attack attempt to exploit an OS Command Execution Vulnerability in Moxa AWK-3131A Industrial IEEE 802.11a/b/g/n wireless AP/bridge/client.
The vulnerability is caused by a lack of input validation when handling a malicious Telnet request. A remote attacker may be able to exploit this to execute arbitrary code within the context of the application, via a crafted Telnet request.

affected-products-logoAffected Products

Moxa AWK-3131A Industrial IEEE 802.11a/b/g/n wireless AP/bridge/client in firmware versions 1.4 to 1.7

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Currently we are unaware of any vendor supplied patch for this issue.

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2019-02-19 14.556 Default_action:pass:drop