Description
An exploitable OS Command Injection vulnerability exists in the Telnet, SSH, and console login functionality of Moxa AWK-3131A Industrial IEEE 802.11a/b/g/n wireless AP/bridge/client in firmware versions 1.4 to 1.7 (current). An attacker can inject commands via the username parameter of several services (SSH, Telnet, console), resulting in remote, unauthenticated, root-level operating system command execution.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
No history.
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2024-09-16T23:55:35.997Z
Reserved: 2017-09-13T00:00:00.000Z
Link: CVE-2017-14459
No data.
Status : Modified
Published: 2018-04-11T16:29:00.213
Modified: 2024-11-21T03:12:50.197
Link: CVE-2017-14459
No data.
OpenCVE Enrichment
No data.
Weaknesses