Description
In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to crash the iocheck process and write memory resulting in loss of integrity and DoS.
References (1)
Core 1
Core References
Vendor Advisory
https://cert.vde.com/en/advisories/VDE-2020-036/
Scores
CVSS v3
9.1
EPSS
0.0090
EPSS Percentile
75.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
total
Details
CWE
CWE-120
Status
published
Products (25)
wago/750-8100_firmware
18 (3 CPE variants)
wago/750-8100_firmware
< 18
wago/750-8101\/025-000_firmware
18 (3 CPE variants)
wago/750-8101\/025-000_firmware
< 18
wago/750-8101_firmware
18 (3 CPE variants)
wago/750-8101_firmware
< 18
wago/750-8102\/025-000_firmware
18 (3 CPE variants)
wago/750-8102\/025-000_firmware
< 18
wago/750-8102_firmware
18 (3 CPE variants)
wago/750-8102_firmware
< 18
... and 15 more
Published
Nov 09, 2022
Tracked Since
Feb 18, 2026