CVE-2018-10695

HIGH

Moxa Awk-3121 Firmware - Memory Corruption

Title source: rule
STIX 2.1

Description

An issue was discovered on Moxa AWK-3121 1.14 devices. It provides alert functionality so that an administrator can send emails to his/her account when there are changes to the device's network. However, the same functionality allows an attacker to execute commands on the device. The POST parameters "to1,to2,to3,to4" are all susceptible to buffer overflow. By crafting a packet that contains a string of 678 characters, it is possible for an attacker to execute the attack.

References (3)

Core 3
Core References
Mailing List, Third Party Advisory mailing-list x_refsource_bugtraq
https://seclists.org/bugtraq/2019/Jun/8

Scores

CVSS v3 8.8
EPSS 0.0060
EPSS Percentile 69.4%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Details

CWE
CWE-119
Status published
Products (1)
moxa/awk-3121_firmware 1.14
Published Jun 07, 2019
Tracked Since Feb 18, 2026