CVE-2017-14459
Moxa AWK-3131A 1.4 < 1.7 - 'Username' OS Command Injection
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
An exploitable OS Command Injection vulnerability exists in the Telnet, SSH, and console login functionality of Moxa AWK-3131A Industrial IEEE 802.11a/b/g/n wireless AP/bridge/client in firmware versions 1.4 to 1.7 (current). An attacker can inject commands via the username parameter of several services (SSH, Telnet, console), resulting in remote, unauthenticated, root-level operating system command execution.
Existe una vulnerabilidad explotable de inyección de comandos del sistema operativo en las funcionalidades Telnet, SSH e inicio de sesión en consola en el AP/bridge/cliente inalámbrico Moxa AWK-3131A Industrial IEEE 802.11a/b/g/n, en versiones de firmware de la 1.4 a la 1.7 (actual). Un atacante puede inyectar comandos mediante el parámetro username de varios servicios (SSH, Telnet, consola), lo que resulta en la ejecución remota no autenticada de comandos del sistema operativo a nivel root.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-04-03 First Exploit
- 2017-09-13 CVE Reserved
- 2018-04-11 CVE Published
- 2024-09-16 CVE Updated
- 2024-11-12 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2017-0507 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/44398 | 2017-04-03 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Moxa Search vendor "Moxa" | Awk-3131a Firmware Search vendor "Moxa" for product "Awk-3131a Firmware" | 1.4 Search vendor "Moxa" for product "Awk-3131a Firmware" and version "1.4" | - |
Affected
| in | Moxa Search vendor "Moxa" | Awk-3131a Search vendor "Moxa" for product "Awk-3131a" | - | - |
Safe
|
Moxa Search vendor "Moxa" | Awk-3131a Firmware Search vendor "Moxa" for product "Awk-3131a Firmware" | 1.5 Search vendor "Moxa" for product "Awk-3131a Firmware" and version "1.5" | - |
Affected
| in | Moxa Search vendor "Moxa" | Awk-3131a Search vendor "Moxa" for product "Awk-3131a" | - | - |
Safe
|
Moxa Search vendor "Moxa" | Awk-3131a Firmware Search vendor "Moxa" for product "Awk-3131a Firmware" | 1.6 Search vendor "Moxa" for product "Awk-3131a Firmware" and version "1.6" | - |
Affected
| in | Moxa Search vendor "Moxa" | Awk-3131a Search vendor "Moxa" for product "Awk-3131a" | - | - |
Safe
|
Moxa Search vendor "Moxa" | Awk-3131a Firmware Search vendor "Moxa" for product "Awk-3131a Firmware" | 1.7 Search vendor "Moxa" for product "Awk-3131a Firmware" and version "1.7" | - |
Affected
| in | Moxa Search vendor "Moxa" | Awk-3131a Search vendor "Moxa" for product "Awk-3131a" | - | - |
Safe
|