An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function of the WAGO PFC 200 Firmware version 03.02.02(14). An attacker can send specially crafted packet at 0x1ea48 to the extracted hostname value from the xml file that is used as an argument to /etc/config-tools/config_interfaces interface=X1 state=enabled ip-address=<contents of ip node> using sprintf().
References
Link Resource
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0962 Exploit Technical Description Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: talos

Published: 2020-03-11T23:17:48

Updated: 2020-03-11T23:17:48

Reserved: 2019-01-04T00:00:00


Link: CVE-2019-5171

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2020-03-12T00:15:18.087

Modified: 2020-03-17T18:14:24.410


Link: CVE-2019-5171

JSON object: View

cve-icon Redhat Information

No data.

CWE