Moxa.AWK-313A.Login.Username.Param.OS.Command.Injection
Description
This indicates an attack attempt to exploit an OS Command Execution Vulnerability in Moxa AWK-3131A Industrial IEEE 802.11a/b/g/n wireless AP/bridge/client.
The vulnerability is caused by a lack of input validation when handling a malicious Telnet request. A remote attacker may be able to exploit this to execute arbitrary code within the context of the application, via a crafted Telnet request.
Affected Products
Moxa AWK-3131A Industrial IEEE 802.11a/b/g/n wireless AP/bridge/client in firmware versions 1.4 to 1.7
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Currently we are unaware of any vendor supplied patch for this issue.
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2019-02-19 | 14.556 | Default_action:pass:drop |