Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
NameCVE-2018-19659First vendor Publication2018-12-06
VendorCveLast vendor Modification2019-01-30

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:S/C:C/I:C/A:C)
Cvss Base Score9Attack RangeNetwork
Cvss Impact Score10Attack ComplexityLow
Cvss Expoit Score8AuthenticationRequires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

An exploitable authenticated command-injection vulnerability exists in the web server functionality of Moxa NPort W2x50A products with firmware before 2.2 Build_18082311. A specially crafted HTTP POST request to /goform/net_WebPingGetValue can result in running OS commands as the root user. This is similar to CVE-2017-12120.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19659

CWE : Common Weakness Enumeration

%idName
100 %CWE-78Improper Sanitization of Special Elements used in an OS Command ('OS Command Injection') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Hardware1

Sources (Detail)

SourceUrl
FULLDISC http://seclists.org/fulldisclosure/2018/Nov/64
MISC http://packetstormsecurity.com/files/150535/Moxa-NPort-W2x50A-2.1-OS-Command-...

Alert History

If you want to see full details history, please login or register.
0
1
DateInformations
2019-01-30 21:18:45
  • Multiple Updates
2018-12-07 05:19:16
  • First insertion