An issue was discovered on WAGO e!DISPLAY 762-3000 through 762-3003 devices with firmware before FW 02. Weak permissions allow an authenticated user to overwrite critical files by abusing the unrestricted file upload in the WBM.
WAGO 750-88X and WAGO 750-89X Ethernet Controller devices, versions 01.09.18(13) and before, have XSS in the SNMP configuration via the webserv/cplcfg/snmp.ssi SNMP_DESC or SNMP_LOC_SNMP_CONT field.
The default configuration of Apache Maven 3.0.4, when using Maven Wagon 2.1, disables SSL certificate checks, which allows remote attackers to spoof servers via a man-in-the-middle (MITM) attack.
An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O-Check’ functionality of WAGO PFC 200 Firmware version 03.02.02(14). The destination buffer sp+0x440 is overflowed with the call to sprintf() for any domainname values that are greater than 1024-len(‘/etc/config-tools/edit_dns_server domain-name=‘) in length. A domainname value of length 0x3fa will cause the service to crash.
An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O-Check’ functionality of WAGO PFC 200 Firmware version 03.02.02(14). An attacker can send a specially crafted packet to trigger the parsing of this cache file.The destination buffer sp+0x40 is overflowed with the call to sprintf() for any gateway values that are greater than 512-len(‘/etc/config-tools/config_default_gateway number=0 state=enabled value=‘) in length. A gateway value of length 0x7e2 will cause the service to crash.
An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O-Check’ functionality of WAGO PFC 200 Firmware version 03.02.02(14). An attacker can send a specially crafted packet to trigger the parsing of this cache file.The destination buffer sp+0x440 is overflowed with the call to sprintf() for any type values that are greater than 1024-len(‘/etc/config-tools/config_interfaces interface=X1 state=enabled config-type=‘) in length. A type value of length 0x3d9 will cause the service to crash.
An issue was discovered on WAGO e!DISPLAY 762-3000 through 762-3003 devices with firmware before FW 02. The vulnerability can be exploited by authenticated and unauthenticated users by sending special crafted requests to the web server allowing injecting code within the WBM. The code will be rendered and/or executed in the browser of the user's browser.
Wago web-based management of multiple products has a vulnerability which allows an local authenticated attacker to change the passwords of other non-admin users and thus to escalate non-root privileges.
On WAGO PFC200 devices in different firmware versions with special crafted packets an attacker with network access to the device could cause a denial of service for the login service of the runtime.
In multiple managed switches by WAGO in different versions special crafted requests can lead to cookies being transferred to third parties.
In multiple managed switches by WAGO in different versions the webserver cookies of the web based UI contain user credentials.
In multiple managed switches by WAGO in different versions the activated directory listing provides an attacker with the index of the resources located inside the directory.
An exploitable timing discrepancy vulnerability exists in the authentication functionality of the Web-Based Management (WBM) web application on WAGO PFC100/200 controllers. The WBM application makes use of the PHP crypt() function which can be exploited to disclose hashed user credentials. This affects WAGO PFC200 Firmware version 03.00.39(12) and version 03.01.07(13), and WAGO PFC100 Firmware version 03.00.39(12).
An exploitable information exposure vulnerability exists in the iocheckd service "I/O-Check" functionality of WAGO PFC200 Firmware versions 03.01.07(13) and 03.00.39(12), and WAGO PFC100 Firmware version 03.00.39(12). A specially crafted set of packets can cause an external tool to fail, resulting in uninitialized stack data to be copied to the response packet buffer. An attacker can send unauthenticated packets to trigger this vulnerability.
Information Disclosure is possible on WAGO Series PFC100 and PFC200 devices before FW12 due to improper access control. A remote attacker can check for the existence of paths and file names via crafted HTTP requests.
Unspecified vulnerability in the NormaliseTrainConsist function in src/train_cmd.cpp in OpenTTD before 0.7.5-RC1 allows remote attackers to cause a denial of service (daemon crash) via certain game actions involving a wagon and a dual-headed engine.
Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a malformed packet.
| CVE ID ⇅ | Severity ↓ | Description | |
|---|---|---|---|
| CVE-2018-12979 | MEDIUM | An issue was discovered on WAGO e!DISPLAY 762-3000 through 762-3003 devices with firmware before FW … | › |
| CVE-2018-16210 | MEDIUM | WAGO 750-88X and WAGO 750-89X Ethernet Controller devices, versions 01.09.18(13) and before, have XS… | › |
| CVE-2013-0253 | MEDIUM | The default configuration of Apache Maven 3.0.4, when using Maven Wagon 2.1, disables SSL certificat… | › |
| CVE-2019-5177 | MEDIUM | An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O… | › |
| CVE-2019-5176 | MEDIUM | An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O… | › |
| CVE-2019-5182 | MEDIUM | An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O… | › |
| CVE-2018-12981 | MEDIUM | An issue was discovered on WAGO e!DISPLAY 762-3000 through 762-3003 devices with firmware before FW … | › |
| CVE-2023-3379 | MEDIUM | Wago web-based management of multiple products has a vulnerability which allows an local authenticat… | › |
| CVE-2021-21000 | MEDIUM | On WAGO PFC200 devices in different firmware versions with special crafted packets an attacker with … | › |
| CVE-2021-20996 | MEDIUM | In multiple managed switches by WAGO in different versions special crafted requests can lead to cook… | › |
| CVE-2021-20995 | MEDIUM | In multiple managed switches by WAGO in different versions the webserver cookies of the web based UI… | › |
| CVE-2021-20993 | MEDIUM | In multiple managed switches by WAGO in different versions the activated directory listing provides … | › |
| CVE-2019-5135 | MEDIUM | An exploitable timing discrepancy vulnerability exists in the authentication functionality of the We… | › |
| CVE-2019-5073 | MEDIUM | An exploitable information exposure vulnerability exists in the iocheckd service "I/O-Check" functio… | › |
| CVE-2019-18202 | MEDIUM | Information Disclosure is possible on WAGO Series PFC100 and PFC200 devices before FW12 due to impro… | › |
| CVE-2009-4007 | MEDIUM | Unspecified vulnerability in the NormaliseTrainConsist function in src/train_cmd.cpp in OpenTTD befo… | › |
| CVE-2023-1619 | MEDIUM | Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high priv… | › |