Vulnerability Description
OpenPLC v3 contains an authenticated remote code execution vulnerability that allows attackers with valid credentials to inject malicious code through the hardware configuration interface. Attackers can upload a custom hardware layer with embedded reverse shell code that establishes a network connection to a specified IP and port, enabling remote command execution.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://github.com/thiagoralves/OpenPLC_v3
- https://www.exploit-db.com/exploits/49803
- https://www.openplcproject.com/
- https://www.vulncheck.com/advisories/openplc-remote-code-execution
FAQ
What is CVE-2021-47770?
CVE-2021-47770 is a vulnerability with a CVSS score of 8.8 (HIGH). OpenPLC v3 contains an authenticated remote code execution vulnerability that allows attackers with valid credentials to inject malicious code through the hardware configuration interface. Attackers c...
How severe is CVE-2021-47770?
CVE-2021-47770 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-47770?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.