Stack-based buffer overflow in Moxa EDS-510E and Moxa EDS-G516E - #VU21339

 

Stack-based buffer overflow in Moxa EDS-510E and Moxa EDS-G516E - #VU21339

Published: September 25, 2019


Vulnerability identifier: #VU21339
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: N/A
CWE-ID: CWE-121
Exploitation vector: Adjecent network
Exploit availability: No public exploit available
Vendor: Moxa
Affected software:
Moxa EDS-510E
Moxa EDS-G516E

Detailed vulnerability description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing untrusted input at the IEEE802.1x setting page in web interface. A remote unauthenticated attacker can send specially crafted request to the affected device, trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install updates from vendor's website.

Sources