Vulnerability Description
An issue was discovered on Moxa AWK-3121 1.14 devices. It provides alert functionality so that an administrator can send emails to his/her account when there are changes to the device's network. However, the same functionality allows an attacker to execute commands on the device. The POST parameters "to1,to2,to3,to4" are all susceptible to buffer overflow. By crafting a packet that contains a string of 678 characters, it is possible for an attacker to execute the attack.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Moxa | Awk-3121 Firmware | 1.14 |
| Moxa | Awk-3121 | - |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/153223/Moxa-AWK-3121-1.14-Information-DisclExploitThird Party AdvisoryVDB Entry
- https://github.com/samuelhuntley/Moxa_AWK_1121/blob/master/Moxa_AWK_1121ExploitThird Party Advisory
- https://seclists.org/bugtraq/2019/Jun/8Mailing ListThird Party Advisory
- http://packetstormsecurity.com/files/153223/Moxa-AWK-3121-1.14-Information-DisclExploitThird Party AdvisoryVDB Entry
- https://github.com/samuelhuntley/Moxa_AWK_1121/blob/master/Moxa_AWK_1121ExploitThird Party Advisory
- https://seclists.org/bugtraq/2019/Jun/8Mailing ListThird Party Advisory
FAQ
What is CVE-2018-10695?
CVE-2018-10695 is a vulnerability with a CVSS score of 8.8 (HIGH). An issue was discovered on Moxa AWK-3121 1.14 devices. It provides alert functionality so that an administrator can send emails to his/her account when there are changes to the device's network. Howev...
How severe is CVE-2018-10695?
CVE-2018-10695 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-10695?
Check the references section above for vendor advisories and patch information. Affected products include: Moxa Awk-3121 Firmware, Moxa Awk-3121.