AID
Automation
Information Directory
HomeCVE FeedBrands
AID
Automation Information Directory
CVE data sourced from NIST NVD · Documentation links from official sources
Home›Brands›Wago
WA
Platform

Wago

750 Series modular fieldbus I/O, PFC200 controllers, WAGO-I/O-PRO and e!COCKPIT engineering software.

https://www.wago.com →
83
Total CVEs
0
Resources
26
CRIT
39
HIGH
17
MED
1
LOW
CVEsCVEsSpecsTech SpecsDocsTech DocsImplImplementationsExamplesExamples
83 entries
CVE-2021-20998CRITICAL

In multiple managed switches by WAGO in different versions without authorization and with specially crafted packets it is possible to create users.

May 13, 2021
10.0
CVE-2020-12522CRITICAL

The reported vulnerability allows an attacker who has network access to the device to execute code with specially crafted packets in WAGO Series PFC 100 (750-81xx/xxx-xxx), Series PFC 200 (750-82xx/xxx-xxx), Series Wago Touch Panel 600 Standard Line (762-4xxx), Series Wago Touch Panel 600 Advanced Line (762-5xxx), Series Wago Touch Panel 600 Marine Line (762-6xxx) with firmware versions <=FW10.

Dec 17, 2020
10.0
CVE-2022-50926CRITICAL

WAGO 750-8212 PFC200 G2 2ETH RS firmware contains a privilege escalation vulnerability that allows attackers to manipulate user session cookies. Attackers can modify the cookie's 'name' and 'roles' parameters to elevate from ordinary user to administrative privileges without authentication.

Jan 13, 2026
9.8
CVE-2023-1698CRITICAL

In multiple products of WAGO a vulnerability allows an unauthenticated, remote attacker to create new users and change the device configuration which can result in unintended behaviour, Denial of Service and full system compromise.

May 15, 2023
9.8
CVE-2021-34569CRITICAL

In WAGO I/O-Check Service in multiple products an attacker can send a specially crafted packet containing OS commands to crash the diagnostic tool and write memory.

Nov 9, 2022
9.8
CVE-2021-34578CRITICAL

This vulnerability allows an attacker who has access to the WBM to read and write settings-parameters of the device by sending specifically constructed requests without authentication on multiple WAGO PLCs in firmware versions up to FW07.

Aug 31, 2021
9.8
CVE-2019-5082CRITICAL

An exploitable heap buffer overflow vulnerability exists in the iocheckd service I/O-Check functionality of WAGO PFC200 Firmware version 03.01.07(13), WAGO PFC200 Firmware version 03.00.39(12), and WAGO PFC100 Firmware version 03.00.39(12). A specially crafted set of packets can cause a heap buffer overflow, potentially resulting in code execution. An attacker can send unauthenticated packets to trigger this vulnerability.

Jan 8, 2020
9.8
CVE-2019-5079CRITICAL

An exploitable heap buffer overflow vulnerability exists in the iocheckd service "I/O-Check" functionality of WAGO PFC200 Firmware versions 03.01.07(13) and 03.00.39(12), and WAGO PFC100 Firmware version 03.00.39(12). A specially crafted set of packets can cause a heap buffer overflow, potentially resulting in code execution. An attacker can send unauthenticated packets to trigger this vulnerability.

Dec 18, 2019
9.8
CVE-2019-5075CRITICAL

An exploitable stack buffer overflow vulnerability exists in the command line utility getcouplerdetails of WAGO PFC200 Firmware versions 03.01.07(13) and 03.00.39(12), and WAGO PFC100 Firmware version 03.00.39(12). A specially crafted set of packets sent to the iocheckd service "I/O-Check" can cause a stack buffer overflow in the sub-process getcouplerdetails, resulting in code execution. An attacker can send unauthenticated packets to trigger this vulnerability.

Dec 18, 2019
9.8
CVE-2019-5081CRITICAL

An exploitable heap buffer overflow vulnerability exists in the iocheckd service ''I/O-Chec'' functionality of WAGO PFC 200 Firmware version 03.01.07(13) and 03.00.39(12), and WAGO PFC100 Firmware version 03.00.39(12). A specially crafted set of packets can cause a heap buffer overflow, potentially resulting in code execution. An attacker can send unauthenticated packets to trigger this vulnerability.

Dec 18, 2019
9.8
CVE-2019-5074CRITICAL

An exploitable stack buffer overflow vulnerability exists in the iocheckd service ''I/O-Check'' functionality of WAGO PFC200 Firmware version 03.01.07(13), WAGO PFC200 Firmware version 03.00.39(12) and WAGO PFC100 Firmware version 03.00.39(12). A specially crafted set of packets can cause a stack buffer overflow, resulting in code execution. An attacker can send unauthenticated packets to trigger this vulnerability.

Dec 18, 2019
9.8
CVE-2019-12550CRITICAL

WAGO 852-303 before FW06, 852-1305 before FW06, and 852-1505 before FW03 devices contain hardcoded users and passwords that can be used to login via SSH and TELNET.

Jun 17, 2019
9.8
CVE-2019-12549CRITICAL

WAGO 852-303 before FW06, 852-1305 before FW06, and 852-1505 before FW03 devices contain hardcoded private keys for the SSH daemon. The fingerprint of the SSH host key from the corresponding SSH daemon matches the embedded private key.

Jun 17, 2019
9.8
CVE-2019-10712CRITICAL

The Web-GUI on WAGO Series 750-88x (750-330, 750-352, 750-829, 750-831, 750-852, 750-880, 750-881, 750-882, 750-884, 750-885, 750-889) and Series 750-87x (750-830, 750-849, 750-871, 750-872, 750-873) devices has undocumented service access.

May 7, 2019
9.8
CVE-2015-6473CRITICAL

WAGO IO 750-849 01.01.27 and WAGO IO 750-881 01.02.05 do not contain privilege separation.

Aug 22, 2017
9.8
CVE-2015-6472CRITICAL

WAGO IO 750-849 01.01.27 and 01.02.05, WAGO IO 750-881, and WAGO IO 758-870 have weak credential management.

Aug 22, 2017
9.8
CVE-2022-3843CRITICAL

In WAGO Unmanaged Switch (852-111/000-001) in firmware version 01 an undocumented configuration interface without authorization allows an remote attacker to read system information and configure a limited set of parameters.

Feb 16, 2023
9.1
CVE-2021-34566CRITICAL

In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to crash the iocheck process and write memory resulting in loss of integrity and DoS.

Nov 9, 2022
9.1
CVE-2021-21001CRITICAL

On WAGO PFC200 devices in different firmware versions with special crafted packets an authorised attacker with network access to the device can access the file system with higher privileges.

May 24, 2021
9.1
CVE-2020-12506CRITICAL

Improper Authentication vulnerability in WAGO 750-8XX series with FW version <= FW03 allows an attacker to change the settings of the devices by sending specifically constructed requests without authentication This issue affects: WAGO 750-362, WAGO 750-363, WAGO 750-823, WAGO 750-832/xxx-xxx, WAGO 750-862, WAGO 750-891, WAGO 750-890/xxx-xxx in versions FW03 and prior versions.

Sep 30, 2020
9.1
CVE-2019-5161CRITICAL

An exploitable remote code execution vulnerability exists in the Cloud Connectivity functionality of WAGO PFC200 versions 03.02.02(14), 03.01.07(13), and 03.00.39(12). A specially crafted XML file will direct the Cloud Connectivity service to download and execute a shell script with root privileges.

Mar 11, 2020
9.1
CVE-2019-5160CRITICAL

An exploitable improper host validation vulnerability exists in the Cloud Connectivity functionality of WAGO PFC200 Firmware versions 03.02.02(14), 03.01.07(13), and 03.00.39(12). A specially crafted HTTPS POST request can cause the software to connect to an unauthorized host, resulting in unauthorized access to firmware update functionality. An attacker can send an authenticated HTTPS POST request to direct the Cloud Connectivity software to connect to an attacker controlled Azure IoT Hub node.

Mar 11, 2020
9.1
CVE-2019-5080CRITICAL

An exploitable denial-of-service vulnerability exists in the iocheckd service "I/O-Check" functionality of WAGO PFC 200 Firmware versions 03.01.07(13) and 03.00.39(12), and WAGO PFC100 Firmware version 03.00.39(12). A single packet can cause a denial of service and weaken credentials resulting in the default documented credentials being applied to the device. An attacker can send an unauthenticated packet to trigger this vulnerability.

Dec 18, 2019
9.1
CVE-2019-5078CRITICAL

An exploitable denial of service vulnerability exists in the iocheckd service "I/O-Check" functionality of WAGO PFC200 Firmware versions 03.01.07(13) and 03.00.39(12), and WAGO PFC100 Firmware version 03.00.39(12). A specially crafted set of packets can cause a denial of service, resulting in the device entering an error state where it ceases all network communications. An attacker can send unauthenticated packets to trigger this vulnerability.

Dec 18, 2019
9.1
CVE-2019-5077CRITICAL

An exploitable denial-of-service vulnerability exists in the iocheckd service ‘’I/O-Chec’’ functionality of WAGO PFC 200 Firmware versions 03.01.07(13) and 03.00.39(12), and WAGO PFC 100 Firmware version 03.00.39(12). A specially crafted set of packets can cause a denial of service, resulting in the device entering an error state where it ceases all network communications. An attacker can send unauthenticated packets to trigger this vulnerability.

Dec 18, 2019
9.1
CVE-2016-9362CRITICAL

An issue was discovered in WAGO 750-8202/PFC200 prior to FW04 (released August 2015), WAGO 750-881 prior to FW09 (released August 2016), and WAGO 0758-0874-0000-0111. By accessing a specific uniform resource locator (URL) on the web server, a malicious user is able to edit and to view settings without authenticating.

Feb 13, 2017
9.1
CVE-2012-4879HIGH

The Linux Console on the WAGO I/O System 758 model 758-870, 758-874, 758-875, and 758-876 Industrial PC (IPC) devices has a default password of wago for the (1) root and (2) admin accounts, (3) a default password of user for the user account, and (4) a default password of guest for the guest account, which makes it easier for remote attackers to obtain login access via a TELNET session, a different vulnerability than CVE-2012-3013.

Sep 7, 2012
10.0
CVE-2012-3013HIGH

WAGO I/O System 758 model 758-870, 758-874, 758-875, and 758-876 Industrial PC (IPC) devices have default passwords for unspecified Web Based Management accounts, which makes it easier for remote attackers to obtain administrative access via a TCP session.

Sep 7, 2012
10.0
CVE-2021-20994HIGH

In multiple managed switches by WAGO in different versions an attacker may trick a legitimate user to click a link to inject possible malicious code into the Web-Based Management.

May 13, 2021
8.8
CVE-2018-12980HIGH

An issue was discovered on WAGO e!DISPLAY 762-3000 through 762-3003 devices with firmware before FW 02. The vulnerability allows an authenticated user to upload arbitrary files to the file system with the permissions of the web server.

Jul 12, 2018
8.8
CVE-2021-34567HIGH

In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to provoke a denial of service and an limited out-of-bounds read.

Nov 9, 2022
8.2
CVE-2020-12505HIGH

Improper Authentication vulnerability in WAGO 750-8XX series with FW version <= FW07 allows an attacker to change some special parameters without authentication. This issue affects: WAGO 750-852, WAGO 750-880/xxx-xxx, WAGO 750-881, WAGO 750-831/xxx-xxx, WAGO 750-882, WAGO 750-885/xxx-xxx, WAGO 750-889 in versions FW07 and below.

Sep 30, 2020
8.2
CVE-2019-5184HIGH

An exploitable double free vulnerability exists in the iocheckd service "I/O-Check" functionality of WAGO PFC 200. A specially crafted XML cache file written to a specific location on the device can cause a heap pointer to be freed twice, resulting in a denial of service and potentially code execution. An attacker can send a specially crafted packet to trigger the parsing of this cache file.

Mar 23, 2020
7.8
CVE-2019-5181HIGH

An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O-Check’ functionality of WAGO PFC 200 Firmware version 03.02.02(14). A specially crafted XML cache file written to a specific location on the device can cause a stack buffer overflow, resulting in code execution. An attacker can send a specially crafted packet to trigger the parsing of this cache file. The destination buffer sp+0x440 is overflowed with the call to sprintf() for any subnetmask values that are greater than 1024-len(‘/etc/config-tools/config_interfaces interface=X1 state=enabled subnet-mask=‘) in length. A subnetmask value of length 0x3d9 will cause the service to crash.

Mar 12, 2020
7.8
CVE-2019-5180HIGH

An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O-Check’ functionality of WAGO PFC 200 Firmware version 03.02.02(14). An attacker can send a specially crafted packet to trigger the parsing of this cache file. The destination buffer sp+0x440 is overflowed with the call to sprintf() for any ip values that are greater than 1024-len(‘/etc/config-tools/config_interfaces interface=X1 state=enabled ip-address=‘) in length. A ip value of length 0x3da will cause the service to crash.

Mar 12, 2020
7.8
CVE-2019-5179HIGH

An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O-Check’ functionality of WAGO PFC 200 Firmware version 03.02.02(14). An attacker can send a specially crafted packet to trigger the parsing of this cache file.

Mar 12, 2020
7.8
CVE-2019-5178HIGH

An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O-Check’ functionality of WAGO PFC 200 Firmware version 03.02.02(14). An attacker can send a specially crafted packet to trigger the parsing of this cache file. The destination buffer sp+0x440 is overflowed with the call to sprintf() for any hostname values that are greater than 1024-len(‘/etc/config-tools/change_hostname hostname=‘) in length. A hostname value of length 0x3fd will cause the service to crash.

Mar 12, 2020
7.8
CVE-2019-5171HIGH

An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function of the WAGO PFC 200 Firmware version 03.02.02(14). An attacker can send specially crafted packet at 0x1ea48 to the extracted hostname value from the xml file that is used as an argument to /etc/config-tools/config_interfaces interface=X1 state=enabled ip-address=<contents of ip node> using sprintf().

Mar 12, 2020
7.8
CVE-2019-5170HIGH

An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function of the WAGO PFC 200 Firmware version 03.02.02(14). A specially crafted XML cache file written to a specific location on the device can be used to inject OS commands. An attacker can send a specially crafted packet to trigger the parsing of this cache file.At 0x1e87c the extracted hostname value from the xml file is used as an argument to /etc/config-tools/change_hostname hostname=<contents of hostname node> using sprintf(). This command is later executed via a call to system().

Mar 12, 2020
7.8
CVE-2019-5169HIGH

An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function of the WAGO PFC 200 Firmware version 03.02.02(14). A specially crafted XML cache file written to a specific location on the device can be used to inject OS commands. An attacker can send a specially crafted packet to trigger the parsing of this cache file. At 0x1e900 the extracted gateway value from the xml file is used as an argument to /etc/config-tools/config_default_gateway number=0 state=enabled value=<contents of gateway node> using sprintf(). This command is later executed via a call to system().

Mar 12, 2020
7.8
CVE-2019-5175HIGH

An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function of the WAGO PFC 200 Firmware version 03.02.02(14). A specially crafted XML cache file written to a specific location on the device can be used to inject OS commands. An attacker can send a specially crafted packet to trigger the parsing of this cache file.At 0x1ea28 the extracted type value from the xml file is used as an argument to /etc/config-tools/config_interfaces interface=X1 state=enabled config-type=<contents of type node> using sprintf(). This command is later executed via a call to system().

Mar 11, 2020
7.8
CVE-2019-5174HIGH

An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function of the WAGO PFC 200 version 03.02.02(14). A specially crafted XML cache file written to a specific location on the device can be used to inject OS commands. An attacker can send a specially crafted packet to trigger the parsing of this cache file.At 0x1e9fc the extracted subnetmask value from the xml file is used as an argument to /etc/config-tools/config_interfaces interface=X1 state=enabled subnet-mask=<contents of subnetmask node> using sprintf(). This command is later executed via a call to system().

Mar 11, 2020
7.8
CVE-2019-5173HIGH

An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function of the WAGO PFC 200 Firmware version 03.02.02(14). A specially crafted XML cache file written to a specific location on the device can be used to inject OS commands. An attacker can send a specially crafted packet to trigger the parsing of this cache file. At 0x1e9fc the extracted state value from the xml file is used as an argument to /etc/config-tools/config_interfaces interface=X1 state=<contents of state node> using sprintf(). This command is later executed via a call to system().

Mar 11, 2020
7.8
CVE-2019-5172HIGH

An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function of the WAGO PFC 200 Firmware version 03.02.02(14). An attacker can send a specially crafted packet to trigger the parsing of this cache file. At 0x1e840 the extracted ntp value from the xml file is used as an argument to /etc/config-tools/config_sntp time-server-%d=<contents of ntp node> using sprintf(). This command is later executed via a call to system(). This is done in a loop and there is no limit to how many ntp entries will be parsed from the xml file.

Mar 11, 2020
7.8
CVE-2019-5168HIGH

An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function of the WAGO PFC 200 version 03.02.02(14). An attacker can send a specially crafted XML cache file At 0x1e8a8 the extracted domainname value from the xml file is used as an argument to /etc/config-tools/edit_dns_server domain-name=<contents of domainname node> using sprintf().This command is later executed via a call to system().

Mar 11, 2020
7.8
CVE-2019-5167HIGH

An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function of the WAGO PFC 200 version 03.02.02(14). At 0x1e3f0 the extracted dns value from the xml file is used as an argument to /etc/config-tools/edit_dns_server %s dns-server-nr=%d dns-server-name=<contents of dns node> using sprintf(). This command is later executed via a call to system(). This is done in a loop and there is no limit to how many dns entries will be parsed from the xml file.

Mar 11, 2020
7.8
CVE-2019-5166HIGH

An exploitable stack buffer overflow vulnerability exists in the iocheckd service ‘I/O-Check’ functionality of WAGO PFC 200 version 03.02.02(14). A specially crafted XML cache file written to a specific location on the device can cause a stack buffer overflow, resulting in code execution. An attacker can send a specially crafted packet to trigger the parsing of this cache file.

Mar 11, 2020
7.8
CVE-2019-5159HIGH

An exploitable improper input validation vulnerability exists in the firmware update functionality of WAGO e!COCKPIT automation software v1.6.0.7. A specially crafted firmware update file can allow an attacker to write arbitrary files to arbitrary locations on WAGO controllers as a part of executing a firmware update, potentially resulting in code execution. An attacker can create a malicious firmware update package file using any zip utility. The user must initiate a firmware update through e!COCKPIT and choose the malicious wup file using the file browser to trigger the vulnerability.

Mar 11, 2020
7.8
CVE-2019-5158HIGH

An exploitable firmware downgrade vulnerability exists in the firmware update package functionality of the WAGO e!COCKPIT automation software v1.6.1.5. A specially crafted firmware update file can allow an attacker to install an older firmware version while the user thinks a newer firmware version is being installed. An attacker can create a custom firmware update package with invalid metadata in order to trigger this vulnerability.

Mar 11, 2020
7.8
CVE-2023-5188HIGH

The MMS Interpreter of WagoAppRTU in versions below 1.4.6.0 which is used by the WAGO Telecontrol Configurator is vulnerable to malformed packets. An remote unauthenticated attacker could send specifically crafted packets that lead to a denial-of-service condition until restart of the affected device.

Dec 5, 2023
7.5
CVE-2023-1150HIGH

Uncontrolled resource consumption in Series WAGO 750-3x/-8x products may allow an unauthenticated remote attacker to DoS the MODBUS server with specially crafted packets.

Jun 26, 2023
7.5
CVE-2021-34568HIGH

In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to provoke a denial of service.

Nov 9, 2022
7.5
CVE-2022-3281HIGH

WAGO Series PFC100/PFC200, Series Touch Panel 600, Compact Controller CC100 and Edge Controller in multiple versions are prone to a loss of MAC-Address-Filtering after reboot. This may allow an remote attacker to circumvent the reach the network that should be protected by the MAC address filter.

Oct 17, 2022
7.5
CVE-2021-34581HIGH

Missing Release of Resource after Effective Lifetime vulnerability in OpenSSL implementation of WAGO 750-831/xxx-xxx, 750-880/xxx-xxx, 750-881, 750-889 in versions FW4 up to FW15 allows an unauthenticated attacker to cause DoS on the device.

Aug 31, 2021
7.5
CVE-2021-20997HIGH

In multiple managed switches by WAGO in different versions it is possible to read out the password hashes of all Web-based Management users.

May 13, 2021
7.5
CVE-2020-12516HIGH

Older firmware versions (FW1 up to FW10) of the WAGO PLC family 750-88x and 750-352 are vulnerable for a special denial of service attack.

Dec 10, 2020
7.5
CVE-2019-5149HIGH

The WBM web application on firmwares prior to 03.02.02 and 03.01.07 on the WAGO PFC100 and PFC2000, respectively, runs on a lighttpd web server and makes use of the FastCGI module, which is intended to provide high performance for all Internet applications without the penalties of Web server APIs. However, the default configuration of this module appears to limit the number of concurrent php-cgi processes to two, which can be abused to cause a denial of service of the entire web server. This affects WAGO PFC200 Firmware version 03.00.39(12) and version 03.01.07(13), and WAGO PFC100 Firmware version 03.00.39(12) and version 03.02.02(14).

Mar 11, 2020
7.5
CVE-2019-5134HIGH

An exploitable regular expression without anchors vulnerability exists in the Web-Based Management (WBM) authentication functionality of WAGO PFC200 versions 03.00.39(12) and 03.01.07(13), and WAGO PFC100 version 03.00.39(12). A specially crafted authentication request can bypass regular expression filters, resulting in sensitive information disclosure.

Mar 11, 2020
7.5
CVE-2019-5107HIGH

A cleartext transmission vulnerability exists in the network communication functionality of WAGO e!Cockpit version 1.5.1.1. An attacker with access to network traffic can easily intercept, interpret, and manipulate data coming from, or destined for e!Cockpit. This includes passwords, configurations, and binaries being transferred to endpoints.

Mar 11, 2020
7.5
CVE-2020-6090HIGH

An exploitable code execution vulnerability exists in the Web-Based Management (WBM) functionality of WAGO PFC 200 03.03.10(15). A specially crafted series of HTTP requests can cause code execution resulting in remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.

Jun 11, 2020
7.2
CVE-2019-5157HIGH

An exploitable command injection vulnerability exists in the Cloud Connectivity functionality of WAGO PFC200 Firmware versions 03.02.02(14), 03.01.07(13), and 03.00.39(12). An attacker can inject OS commands into the TimeoutUnconfirmed parameter value contained in the Firmware Update command.

Mar 11, 2020
7.2
CVE-2019-5156HIGH

An exploitable command injection vulnerability exists in the cloud connectivity functionality of WAGO PFC200 versions 03.02.02(14), 03.01.07(13), and 03.00.39(12). An attacker can inject operating system commands into the TimeoutPrepared parameter value contained in the firmware update command.

Mar 11, 2020
7.2
CVE-2019-5155HIGH

An exploitable command injection vulnerability exists in the cloud connectivity feature of WAGO PFC200. An attacker can inject operating system commands into any of the parameter values contained in the firmware update command. This affects WAGO PFC200 Firmware version 03.02.02(14), version 03.01.07(13), and version 03.00.39(12)

Mar 11, 2020
7.2
CVE-2019-5186HIGH

An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service "I/O-Check" functionality of WAGO PFC 200. An attacker can send a specially crafted packet to trigger the parsing of this cache file.At 0x1eb9c the extracted interface element name from the xml file is used as an argument to /etc/config-tools/config_interfaces interface=<contents of interface element> using sprintf(). The destination buffer sp+0x40 is overflowed with the call to sprintf() for any interface values that are greater than 512-len("/etc/config-tools/config_interfaces interface=") in length. Later, at 0x1ea08 strcpy() is used to copy the contents of the stack buffer that was overflowed sp+0x40 into sp+0x440. The buffer sp+0x440 is immediately adjacent to sp+0x40 on the stack. Therefore, there is no NULL termination on the buffer sp+0x40 since it overflowed into sp+0x440. The strcpy() will result in invalid memory access. An interface value of length 0x3c4 will cause the service to crash.

Mar 23, 2020
7.0
CVE-2019-5185HIGH

An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service "I/O-Check" functionality of WAGO PFC 200. An attacker can send a specially crafted packet to trigger the parsing of this cache file. At 0x1ea28 the extracted state value from the xml file is used as an argument to /etc/config-tools/config_interfaces interface=X1 state=<contents of state node> using sprintf(). The destination buffer sp+0x40 is overflowed with the call to sprintf() for any state values that are greater than 512-len("/etc/config-tools/config_interfaces interface=X1 state=") in length. Later, at 0x1ea08 strcpy() is used to copy the contents of the stack buffer that was overflowed sp+0x40 into sp+0x440. The buffer sp+0x440 is immediately adjacent to sp+0x40 on the stack. Therefore, there is no NULL termination on the buffer sp+0x40 since it overflowed into sp+0x440. The strcpy() will result in invalid memory access. An state value of length 0x3c9 will cause the service to crash.

Mar 23, 2020
7.0
CVE-2018-12979MEDIUM

An issue was discovered on WAGO e!DISPLAY 762-3000 through 762-3003 devices with firmware before FW 02. Weak permissions allow an authenticated user to overwrite critical files by abusing the unrestricted file upload in the WBM.

Jul 12, 2018
6.5
CVE-2018-16210MEDIUM

WAGO 750-88X and WAGO 750-89X Ethernet Controller devices, versions 01.09.18(13) and before, have XSS in the SNMP configuration via the webserv/cplcfg/snmp.ssi SNMP_DESC or SNMP_LOC_SNMP_CONT field.

Oct 12, 2018
6.1
CVE-2013-0253MEDIUM

The default configuration of Apache Maven 3.0.4, when using Maven Wagon 2.1, disables SSL certificate checks, which allows remote attackers to spoof servers via a man-in-the-middle (MITM) attack.

Apr 9, 2013
5.8
CVE-2019-5177MEDIUM

An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O-Check’ functionality of WAGO PFC 200 Firmware version 03.02.02(14). The destination buffer sp+0x440 is overflowed with the call to sprintf() for any domainname values that are greater than 1024-len(‘/etc/config-tools/edit_dns_server domain-name=‘) in length. A domainname value of length 0x3fa will cause the service to crash.

Mar 12, 2020
5.5
CVE-2019-5176MEDIUM

An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O-Check’ functionality of WAGO PFC 200 Firmware version 03.02.02(14). An attacker can send a specially crafted packet to trigger the parsing of this cache file.The destination buffer sp+0x40 is overflowed with the call to sprintf() for any gateway values that are greater than 512-len(‘/etc/config-tools/config_default_gateway number=0 state=enabled value=‘) in length. A gateway value of length 0x7e2 will cause the service to crash.

Mar 12, 2020
5.5
CVE-2019-5182MEDIUM

An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O-Check’ functionality of WAGO PFC 200 Firmware version 03.02.02(14). An attacker can send a specially crafted packet to trigger the parsing of this cache file.The destination buffer sp+0x440 is overflowed with the call to sprintf() for any type values that are greater than 1024-len(‘/etc/config-tools/config_interfaces interface=X1 state=enabled config-type=‘) in length. A type value of length 0x3d9 will cause the service to crash.

Mar 11, 2020
5.5
CVE-2018-12981MEDIUM

An issue was discovered on WAGO e!DISPLAY 762-3000 through 762-3003 devices with firmware before FW 02. The vulnerability can be exploited by authenticated and unauthenticated users by sending special crafted requests to the web server allowing injecting code within the WBM. The code will be rendered and/or executed in the browser of the user's browser.

Jul 12, 2018
5.4
CVE-2023-3379MEDIUM

Wago web-based management of multiple products has a vulnerability which allows an local authenticated attacker to change the passwords of other non-admin users and thus to escalate non-root privileges.

Nov 20, 2023
5.3
CVE-2021-21000MEDIUM

On WAGO PFC200 devices in different firmware versions with special crafted packets an attacker with network access to the device could cause a denial of service for the login service of the runtime.

May 24, 2021
5.3
CVE-2021-20996MEDIUM

In multiple managed switches by WAGO in different versions special crafted requests can lead to cookies being transferred to third parties.

May 13, 2021
5.3
CVE-2021-20995MEDIUM

In multiple managed switches by WAGO in different versions the webserver cookies of the web based UI contain user credentials.

May 13, 2021
5.3
CVE-2021-20993MEDIUM

In multiple managed switches by WAGO in different versions the activated directory listing provides an attacker with the index of the resources located inside the directory.

May 13, 2021
5.3
CVE-2019-5135MEDIUM

An exploitable timing discrepancy vulnerability exists in the authentication functionality of the Web-Based Management (WBM) web application on WAGO PFC100/200 controllers. The WBM application makes use of the PHP crypt() function which can be exploited to disclose hashed user credentials. This affects WAGO PFC200 Firmware version 03.00.39(12) and version 03.01.07(13), and WAGO PFC100 Firmware version 03.00.39(12).

Mar 11, 2020
5.3
CVE-2019-5073MEDIUM

An exploitable information exposure vulnerability exists in the iocheckd service "I/O-Check" functionality of WAGO PFC200 Firmware versions 03.01.07(13) and 03.00.39(12), and WAGO PFC100 Firmware version 03.00.39(12). A specially crafted set of packets can cause an external tool to fail, resulting in uninitialized stack data to be copied to the response packet buffer. An attacker can send unauthenticated packets to trigger this vulnerability.

Dec 18, 2019
5.3
CVE-2019-18202MEDIUM

Information Disclosure is possible on WAGO Series PFC100 and PFC200 devices before FW12 due to improper access control. A remote attacker can check for the existence of paths and file names via crafted HTTP requests.

Oct 19, 2019
5.3
CVE-2009-4007MEDIUM

Unspecified vulnerability in the NormaliseTrainConsist function in src/train_cmd.cpp in OpenTTD before 0.7.5-RC1 allows remote attackers to cause a denial of service (daemon crash) via certain game actions involving a wagon and a dual-headed engine.

Dec 28, 2009
5.0
CVE-2023-1619MEDIUM

Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a malformed packet.

Jun 26, 2023
4.9
CVE-2023-4089LOW

On affected Wago products an remote attacker with administrative privileges can access files to which he has already access to through an undocumented local file inclusion. This access is logged in a different log file than expected.

Oct 17, 2023
2.7
CVE ID ⇅Severity ↓CVSS ⇅DescriptionPublished ⇅
CVE-2021-20998CRITICAL
10.0
In multiple managed switches by WAGO in different versions without authorization and with specially …May 13, 2021›
CVE-2020-12522CRITICAL
10.0
The reported vulnerability allows an attacker who has network access to the device to execute code w…Dec 17, 2020›
CVE-2022-50926CRITICAL
9.8
WAGO 750-8212 PFC200 G2 2ETH RS firmware contains a privilege escalation vulnerability that allows a…Jan 13, 2026›
CVE-2023-1698CRITICAL
9.8
In multiple products of WAGO a vulnerability allows an unauthenticated, remote attacker to create ne…May 15, 2023›
CVE-2021-34569CRITICAL
9.8
In WAGO I/O-Check Service in multiple products an attacker can send a specially crafted packet conta…Nov 9, 2022›
CVE-2021-34578CRITICAL
9.8
This vulnerability allows an attacker who has access to the WBM to read and write settings-parameter…Aug 31, 2021›
CVE-2019-5082CRITICAL
9.8
An exploitable heap buffer overflow vulnerability exists in the iocheckd service I/O-Check functiona…Jan 8, 2020›
CVE-2019-5079CRITICAL
9.8
An exploitable heap buffer overflow vulnerability exists in the iocheckd service "I/O-Check" functio…Dec 18, 2019›
CVE-2019-5075CRITICAL
9.8
An exploitable stack buffer overflow vulnerability exists in the command line utility getcouplerdeta…Dec 18, 2019›
CVE-2019-5081CRITICAL
9.8
An exploitable heap buffer overflow vulnerability exists in the iocheckd service ''I/O-Chec'' functi…Dec 18, 2019›
CVE-2019-5074CRITICAL
9.8
An exploitable stack buffer overflow vulnerability exists in the iocheckd service ''I/O-Check'' func…Dec 18, 2019›
CVE-2019-12550CRITICAL
9.8
WAGO 852-303 before FW06, 852-1305 before FW06, and 852-1505 before FW03 devices contain hardcoded u…Jun 17, 2019›
CVE-2019-12549CRITICAL
9.8
WAGO 852-303 before FW06, 852-1305 before FW06, and 852-1505 before FW03 devices contain hardcoded p…Jun 17, 2019›
CVE-2019-10712CRITICAL
9.8
The Web-GUI on WAGO Series 750-88x (750-330, 750-352, 750-829, 750-831, 750-852, 750-880, 750-881, 7…May 7, 2019›
CVE-2015-6473CRITICAL
9.8
WAGO IO 750-849 01.01.27 and WAGO IO 750-881 01.02.05 do not contain privilege separation.Aug 22, 2017›
CVE-2015-6472CRITICAL
9.8
WAGO IO 750-849 01.01.27 and 01.02.05, WAGO IO 750-881, and WAGO IO 758-870 have weak credential man…Aug 22, 2017›
CVE-2022-3843CRITICAL
9.1
In WAGO Unmanaged Switch (852-111/000-001) in firmware version 01 an undocumented configuration inte…Feb 16, 2023›
CVE-2021-34566CRITICAL
9.1
In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a special…Nov 9, 2022›
CVE-2021-21001CRITICAL
9.1
On WAGO PFC200 devices in different firmware versions with special crafted packets an authorised att…May 24, 2021›
CVE-2020-12506CRITICAL
9.1
Improper Authentication vulnerability in WAGO 750-8XX series with FW version <= FW03 allows an attac…Sep 30, 2020›
CVE-2019-5161CRITICAL
9.1
An exploitable remote code execution vulnerability exists in the Cloud Connectivity functionality of…Mar 11, 2020›
CVE-2019-5160CRITICAL
9.1
An exploitable improper host validation vulnerability exists in the Cloud Connectivity functionality…Mar 11, 2020›
CVE-2019-5080CRITICAL
9.1
An exploitable denial-of-service vulnerability exists in the iocheckd service "I/O-Check" functional…Dec 18, 2019›
CVE-2019-5078CRITICAL
9.1
An exploitable denial of service vulnerability exists in the iocheckd service "I/O-Check" functional…Dec 18, 2019›
CVE-2019-5077CRITICAL
9.1
An exploitable denial-of-service vulnerability exists in the iocheckd service ‘’I/O-Chec’’ functiona…Dec 18, 2019›
CVE-2016-9362CRITICAL
9.1
An issue was discovered in WAGO 750-8202/PFC200 prior to FW04 (released August 2015), WAGO 750-881 p…Feb 13, 2017›
CVE-2012-4879HIGH
10.0
The Linux Console on the WAGO I/O System 758 model 758-870, 758-874, 758-875, and 758-876 Industrial…Sep 7, 2012›
CVE-2012-3013HIGH
10.0
WAGO I/O System 758 model 758-870, 758-874, 758-875, and 758-876 Industrial PC (IPC) devices have de…Sep 7, 2012›
CVE-2021-20994HIGH
8.8
In multiple managed switches by WAGO in different versions an attacker may trick a legitimate user t…May 13, 2021›
CVE-2018-12980HIGH
8.8
An issue was discovered on WAGO e!DISPLAY 762-3000 through 762-3003 devices with firmware before FW …Jul 12, 2018›
CVE-2021-34567HIGH
8.2
In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a special…Nov 9, 2022›
CVE-2020-12505HIGH
8.2
Improper Authentication vulnerability in WAGO 750-8XX series with FW version <= FW07 allows an attac…Sep 30, 2020›
CVE-2019-5184HIGH
7.8
An exploitable double free vulnerability exists in the iocheckd service "I/O-Check" functionality of…Mar 23, 2020›
CVE-2019-5181HIGH
7.8
An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O…Mar 12, 2020›
CVE-2019-5180HIGH
7.8
An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O…Mar 12, 2020›
CVE-2019-5179HIGH
7.8
An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O…Mar 12, 2020›
CVE-2019-5178HIGH
7.8
An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O…Mar 12, 2020›
CVE-2019-5171HIGH
7.8
An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function o…Mar 12, 2020›
CVE-2019-5170HIGH
7.8
An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function o…Mar 12, 2020›
CVE-2019-5169HIGH
7.8
An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function o…Mar 12, 2020›
CVE-2019-5175HIGH
7.8
An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function o…Mar 11, 2020›
CVE-2019-5174HIGH
7.8
An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function o…Mar 11, 2020›
CVE-2019-5173HIGH
7.8
An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function o…Mar 11, 2020›
CVE-2019-5172HIGH
7.8
An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function o…Mar 11, 2020›
CVE-2019-5168HIGH
7.8
An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function o…Mar 11, 2020›
CVE-2019-5167HIGH
7.8
An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function o…Mar 11, 2020›
CVE-2019-5166HIGH
7.8
An exploitable stack buffer overflow vulnerability exists in the iocheckd service ‘I/O-Check’ functi…Mar 11, 2020›
CVE-2019-5159HIGH
7.8
An exploitable improper input validation vulnerability exists in the firmware update functionality o…Mar 11, 2020›
CVE-2019-5158HIGH
7.8
An exploitable firmware downgrade vulnerability exists in the firmware update package functionality …Mar 11, 2020›
CVE-2023-5188HIGH
7.5
The MMS Interpreter of WagoAppRTU in versions below 1.4.6.0 which is used by the WAGO Telecontrol Co…Dec 5, 2023›
CVE-2023-1150HIGH
7.5
Uncontrolled resource consumption in Series WAGO 750-3x/-8x products may allow an unauthenticated re…Jun 26, 2023›
CVE-2021-34568HIGH
7.5
In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a special…Nov 9, 2022›
CVE-2022-3281HIGH
7.5
WAGO Series PFC100/PFC200, Series Touch Panel 600, Compact Controller CC100 and Edge Controller in m…Oct 17, 2022›
CVE-2021-34581HIGH
7.5
Missing Release of Resource after Effective Lifetime vulnerability in OpenSSL implementation of WAGO…Aug 31, 2021›
CVE-2021-20997HIGH
7.5
In multiple managed switches by WAGO in different versions it is possible to read out the password h…May 13, 2021›
CVE-2020-12516HIGH
7.5
Older firmware versions (FW1 up to FW10) of the WAGO PLC family 750-88x and 750-352 are vulnerable f…Dec 10, 2020›
CVE-2019-5149HIGH
7.5
The WBM web application on firmwares prior to 03.02.02 and 03.01.07 on the WAGO PFC100 and PFC2000, …Mar 11, 2020›
CVE-2019-5134HIGH
7.5
An exploitable regular expression without anchors vulnerability exists in the Web-Based Management (…Mar 11, 2020›
CVE-2019-5107HIGH
7.5
A cleartext transmission vulnerability exists in the network communication functionality of WAGO e!C…Mar 11, 2020›
CVE-2020-6090HIGH
7.2
An exploitable code execution vulnerability exists in the Web-Based Management (WBM) functionality o…Jun 11, 2020›
CVE-2019-5157HIGH
7.2
An exploitable command injection vulnerability exists in the Cloud Connectivity functionality of WAG…Mar 11, 2020›
CVE-2019-5156HIGH
7.2
An exploitable command injection vulnerability exists in the cloud connectivity functionality of WAG…Mar 11, 2020›
CVE-2019-5155HIGH
7.2
An exploitable command injection vulnerability exists in the cloud connectivity feature of WAGO PFC2…Mar 11, 2020›
CVE-2019-5186HIGH
7.0
An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service "I/O…Mar 23, 2020›
CVE-2019-5185HIGH
7.0
An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service "I/O…Mar 23, 2020›
CVE-2018-12979MEDIUM
6.5
An issue was discovered on WAGO e!DISPLAY 762-3000 through 762-3003 devices with firmware before FW …Jul 12, 2018›
CVE-2018-16210MEDIUM
6.1
WAGO 750-88X and WAGO 750-89X Ethernet Controller devices, versions 01.09.18(13) and before, have XS…Oct 12, 2018›
CVE-2013-0253MEDIUM
5.8
The default configuration of Apache Maven 3.0.4, when using Maven Wagon 2.1, disables SSL certificat…Apr 9, 2013›
CVE-2019-5177MEDIUM
5.5
An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O…Mar 12, 2020›
CVE-2019-5176MEDIUM
5.5
An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O…Mar 12, 2020›
CVE-2019-5182MEDIUM
5.5
An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O…Mar 11, 2020›
CVE-2018-12981MEDIUM
5.4
An issue was discovered on WAGO e!DISPLAY 762-3000 through 762-3003 devices with firmware before FW …Jul 12, 2018›
CVE-2023-3379MEDIUM
5.3
Wago web-based management of multiple products has a vulnerability which allows an local authenticat…Nov 20, 2023›
CVE-2021-21000MEDIUM
5.3
On WAGO PFC200 devices in different firmware versions with special crafted packets an attacker with …May 24, 2021›
CVE-2021-20996MEDIUM
5.3
In multiple managed switches by WAGO in different versions special crafted requests can lead to cook…May 13, 2021›
CVE-2021-20995MEDIUM
5.3
In multiple managed switches by WAGO in different versions the webserver cookies of the web based UI…May 13, 2021›
CVE-2021-20993MEDIUM
5.3
In multiple managed switches by WAGO in different versions the activated directory listing provides …May 13, 2021›
CVE-2019-5135MEDIUM
5.3
An exploitable timing discrepancy vulnerability exists in the authentication functionality of the We…Mar 11, 2020›
CVE-2019-5073MEDIUM
5.3
An exploitable information exposure vulnerability exists in the iocheckd service "I/O-Check" functio…Dec 18, 2019›
CVE-2019-18202MEDIUM
5.3
Information Disclosure is possible on WAGO Series PFC100 and PFC200 devices before FW12 due to impro…Oct 19, 2019›
CVE-2009-4007MEDIUM
5.0
Unspecified vulnerability in the NormaliseTrainConsist function in src/train_cmd.cpp in OpenTTD befo…Dec 28, 2009›
CVE-2023-1619MEDIUM
4.9
Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high priv…Jun 26, 2023›
CVE-2023-4089LOW
2.7
On affected Wago products an remote attacker with administrative privileges can access files to whic…Oct 17, 2023›