Description
An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function of the WAGO PFC 200 version 03.02.02(14). An attacker can send a specially crafted XML cache file At 0x1e8a8 the extracted domainname value from the xml file is used as an argument to /etc/config-tools/edit_dns_server domain-name=<contents of domainname node> using sprintf().This command is later executed via a call to system().
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-14773 | An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function of the WAGO PFC 200 version 03.02.02(14). An attacker can send a specially crafted XML cache file At 0x1e8a8 the extracted domainname value from the xml file is used as an argument to /etc/config-tools/edit_dns_server domain-name=<contents of domainname node> using sprintf().This command is later executed via a call to system(). |
References
History
No history.
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2024-08-04T19:47:56.825Z
Reserved: 2019-01-04T00:00:00.000Z
Link: CVE-2019-5168
No data.
Status : Modified
Published: 2020-03-11T22:27:41.443
Modified: 2024-11-21T04:44:28.840
Link: CVE-2019-5168
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD