Show filters
105 Total Results
Displaying 41-50 of 105
Sort by:
Attacker Value
Unknown
CVE-2021-20993
Disclosure Date: May 05, 2021 (last updated February 22, 2025)
In multiple managed switches by WAGO in different versions the activated directory listing provides an attacker with the index of the resources located inside the directory.
0
Attacker Value
Unknown
CVE-2021-20998
Disclosure Date: May 05, 2021 (last updated February 22, 2025)
In multiple managed switches by WAGO in different versions without authorization and with specially crafted packets it is possible to create users.
0
Attacker Value
Unknown
CVE-2020-12525
Disclosure Date: January 14, 2021 (last updated February 22, 2025)
M&M Software fdtCONTAINER Component in versions below 3.5.20304.x and between 3.6 and 3.6.20304.x is vulnerable to deserialization of untrusted data in its project storage.
0
Attacker Value
Unknown
CVE-2020-12522
Disclosure Date: December 17, 2020 (last updated February 22, 2025)
The reported vulnerability allows an attacker who has network access to the device to execute code with specially crafted packets in WAGO Series PFC 100 (750-81xx/xxx-xxx), Series PFC 200 (750-82xx/xxx-xxx), Series Wago Touch Panel 600 Standard Line (762-4xxx), Series Wago Touch Panel 600 Advanced Line (762-5xxx), Series Wago Touch Panel 600 Marine Line (762-6xxx) with firmware versions <=FW10.
0
Attacker Value
Unknown
CVE-2020-12516
Disclosure Date: December 09, 2020 (last updated February 22, 2025)
Older firmware versions (FW1 up to FW10) of the WAGO PLC family 750-88x and 750-352 are vulnerable for a special denial of service attack.
0
Attacker Value
Unknown
CVE-2020-12505
Disclosure Date: September 29, 2020 (last updated February 22, 2025)
Improper Authentication vulnerability in WAGO 750-8XX series with FW version <= FW07 allows an attacker to change some special parameters without authentication. This issue affects: WAGO 750-852, WAGO 750-880/xxx-xxx, WAGO 750-881, WAGO 750-831/xxx-xxx, WAGO 750-882, WAGO 750-885/xxx-xxx, WAGO 750-889 in versions FW07 and below.
0
Attacker Value
Unknown
CVE-2020-12506
Disclosure Date: September 29, 2020 (last updated February 22, 2025)
Improper Authentication vulnerability in WAGO 750-8XX series with FW version <= FW03 allows an attacker to change the settings of the devices by sending specifically constructed requests without authentication This issue affects: WAGO 750-362, WAGO 750-363, WAGO 750-823, WAGO 750-832/xxx-xxx, WAGO 750-862, WAGO 750-891, WAGO 750-890/xxx-xxx in versions FW03 and prior versions.
0
Attacker Value
Unknown
CVE-2020-6090
Disclosure Date: June 11, 2020 (last updated February 21, 2025)
An exploitable code execution vulnerability exists in the Web-Based Management (WBM) functionality of WAGO PFC 200 03.03.10(15). A specially crafted series of HTTP requests can cause code execution resulting in remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2019-5185
Disclosure Date: March 23, 2020 (last updated February 21, 2025)
An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service "I/O-Check" functionality of WAGO PFC 200. An attacker can send a specially crafted packet to trigger the parsing of this cache file. At 0x1ea28 the extracted state value from the xml file is used as an argument to /etc/config-tools/config_interfaces interface=X1 state=<contents of state node> using sprintf(). The destination buffer sp+0x40 is overflowed with the call to sprintf() for any state values that are greater than 512-len("/etc/config-tools/config_interfaces interface=X1 state=") in length. Later, at 0x1ea08 strcpy() is used to copy the contents of the stack buffer that was overflowed sp+0x40 into sp+0x440. The buffer sp+0x440 is immediately adjacent to sp+0x40 on the stack. Therefore, there is no NULL termination on the buffer sp+0x40 since it overflowed into sp+0x440. The strcpy() will result in invalid memory access. An state value of length 0x3c9 will cause the service to crash.
0
Attacker Value
Unknown
CVE-2019-5184
Disclosure Date: March 23, 2020 (last updated February 21, 2025)
An exploitable double free vulnerability exists in the iocheckd service "I/O-Check" functionality of WAGO PFC 200. A specially crafted XML cache file written to a specific location on the device can cause a heap pointer to be freed twice, resulting in a denial of service and potentially code execution. An attacker can send a specially crafted packet to trigger the parsing of this cache file.
0