Description
An exploitable HTTP Header Injection vulnerability exists in the Web Application functionality of the Moxa AWK-3131A Wireless Access Point running firmware 1.1. A specially crafted HTTP request can inject a payload in the bkpath parameter which will be copied in to Location header of the HTTP response.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2016-9559 | An exploitable HTTP Header Injection vulnerability exists in the Web Application functionality of the Moxa AWK-3131A Wireless Access Point running firmware 1.1. A specially crafted HTTP request can inject a payload in the bkpath parameter which will be copied in to Location header of the HTTP response. |
References
| Link | Providers |
|---|---|
| http://www.talosintelligence.com/reports/TALOS-2016-0234/ |
|
History
No history.
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2024-08-06T02:27:41.299Z
Reserved: 2016-10-17T00:00:00.000Z
Link: CVE-2016-8720
No data.
Status : Modified
Published: 2017-04-13T19:59:00.237
Modified: 2026-05-13T00:24:29.033
Link: CVE-2016-8720
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD