
CVE-2019-5171
https://notcve.org/view.php?id=CVE-2019-5171
11 Mar 2020 — An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function of the WAGO PFC 200 Firmware version 03.02.02(14). An attacker can send specially crafted packet at 0x1ea48 to the extracted hostname value from the xml file that is used as an argument to /etc/config-tools/config_interfaces interface=X1 state=enabled ip-address=

CVE-2019-5170
https://notcve.org/view.php?id=CVE-2019-5170
11 Mar 2020 — An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function of the WAGO PFC 200 Firmware version 03.02.02(14). A specially crafted XML cache file written to a specific location on the device can be used to inject OS commands. An attacker can send a specially crafted packet to trigger the parsing of this cache file.At 0x1e87c the extracted hostname value from the xml file is used as an argument to /etc/config-tools/change_hostname hostname=

CVE-2019-5169
https://notcve.org/view.php?id=CVE-2019-5169
11 Mar 2020 — An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function of the WAGO PFC 200 Firmware version 03.02.02(14). A specially crafted XML cache file written to a specific location on the device can be used to inject OS commands. An attacker can send a specially crafted packet to trigger the parsing of this cache file. At 0x1e900 the extracted gateway value from the xml file is used as an argument to /etc/config-tools/config_default_gateway number=0 state=enabled value=

CVE-2019-5174
https://notcve.org/view.php?id=CVE-2019-5174
11 Mar 2020 — An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function of the WAGO PFC 200 version 03.02.02(14). A specially crafted XML cache file written to a specific location on the device can be used to inject OS commands. An attacker can send a specially crafted packet to trigger the parsing of this cache file.At 0x1e9fc the extracted subnetmask value from the xml file is used as an argument to /etc/config-tools/config_interfaces interface=X1 state=enabled subnet-mask=

CVE-2019-5175
https://notcve.org/view.php?id=CVE-2019-5175
11 Mar 2020 — An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function of the WAGO PFC 200 Firmware version 03.02.02(14). A specially crafted XML cache file written to a specific location on the device can be used to inject OS commands. An attacker can send a specially crafted packet to trigger the parsing of this cache file.At 0x1ea28 the extracted type value from the xml file is used as an argument to /etc/config-tools/config_interfaces interface=X1 state=enabled config-type=

CVE-2019-5172
https://notcve.org/view.php?id=CVE-2019-5172
11 Mar 2020 — An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function of the WAGO PFC 200 Firmware version 03.02.02(14). An attacker can send a specially crafted packet to trigger the parsing of this cache file. At 0x1e840 the extracted ntp value from the xml file is used as an argument to /etc/config-tools/config_sntp time-server-%d=

CVE-2019-5173
https://notcve.org/view.php?id=CVE-2019-5173
11 Mar 2020 — An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function of the WAGO PFC 200 Firmware version 03.02.02(14). A specially crafted XML cache file written to a specific location on the device can be used to inject OS commands. An attacker can send a specially crafted packet to trigger the parsing of this cache file. At 0x1e9fc the extracted state value from the xml file is used as an argument to /etc/config-tools/config_interfaces interface=X1 state=

CVE-2019-5182
https://notcve.org/view.php?id=CVE-2019-5182
11 Mar 2020 — An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O-Check’ functionality of WAGO PFC 200 Firmware version 03.02.02(14). An attacker can send a specially crafted packet to trigger the parsing of this cache file.The destination buffer sp+0x440 is overflowed with the call to sprintf() for any type values that are greater than 1024-len(‘/etc/config-tools/config_interfaces interface=X1 state=enabled config-type=‘) in length. A type value of length 0x3d9 will cause... • https://talosintelligence.com/vulnerability_reports/TALOS-2019-0963 • CWE-787: Out-of-bounds Write •

CVE-2019-5161
https://notcve.org/view.php?id=CVE-2019-5161
10 Mar 2020 — An exploitable remote code execution vulnerability exists in the Cloud Connectivity functionality of WAGO PFC200 versions 03.02.02(14), 03.01.07(13), and 03.00.39(12). A specially crafted XML file will direct the Cloud Connectivity service to download and execute a shell script with root privileges. Existe una vulnerabilidad de ejecución de código remota explotable en la funcionalidad Cloud Connectivity de WAGO PFC200 versiones 03.02.02(14), 03.01.07(13) y 03.00.39(12). Un archivo XML especialmente diseñado... • https://talosintelligence.com/vulnerability_reports/TALOS-2019-0954 • CWE-345: Insufficient Verification of Data Authenticity •

CVE-2019-5156
https://notcve.org/view.php?id=CVE-2019-5156
10 Mar 2020 — An exploitable command injection vulnerability exists in the cloud connectivity functionality of WAGO PFC200 versions 03.02.02(14), 03.01.07(13), and 03.00.39(12). An attacker can inject operating system commands into the TimeoutPrepared parameter value contained in the firmware update command. Existe una vulnerabilidad de inyección de comando explotable en la funcionalidad cloud connectivity de WAGO PFC200 versiones 03.02.02(14), 03.01.07(13) y 03.00.39(12). Un atacante puede inyectar comandos de sistema o... • https://talosintelligence.com/vulnerability_reports/TALOS-2019-0949 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •