CVE-2018-10702
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
An issue was discovered on Moxa AWK-3121 1.14 devices. It provides functionality so that an administrator can run scripts on the device to troubleshoot any issues. However, the same functionality allows an attacker to execute commands on the device. The POST parameter "iw_filename" is susceptible to command injection via shell metacharacters.
Se encontró un problema en los dispositivos Moxa AWK-3121 versión 1.14. Proporciona funcionalidad para que un administrador pueda ejecutar scripts en el dispositivo para solucionar cualquier problema. Sin embargo, la misma funcionalidad permite que un atacante ejecute comandos en el dispositivo. El parámetro POST "iw_filename" es susceptible de inyección de comandos a través de metacaracteres shell.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-05-03 CVE Reserved
- 2019-06-07 CVE Published
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- 2024-10-28 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://seclists.org/bugtraq/2019/Jun/8 | Mailing List |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Moxa Search vendor "Moxa" | Awk-3121 Firmware Search vendor "Moxa" for product "Awk-3121 Firmware" | 1.14 Search vendor "Moxa" for product "Awk-3121 Firmware" and version "1.14" | - |
Affected
| in | Moxa Search vendor "Moxa" | Awk-3121 Search vendor "Moxa" for product "Awk-3121" | - | - |
Safe
|