An issue was discovered on WAGO e!DISPLAY 762-3000 through 762-3003 devices with firmware before FW 02. The vulnerability allows an authenticated user to upload arbitrary files to the file system with the permissions of the web server.
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Link | Tags |
---|---|
https://cert.vde.com/en-us/advisories/vde-2018-010 | third party advisory |
https://www.sec-consult.com/en/blog/advisories/remote-code-execution-via-multiple-attack-vectors-in-wago-edisplay/ | third party advisory exploit |
https://ics-cert.us-cert.gov/advisories/ICSA-18-198-02 | third party advisory us government resource |
https://www.wago.com/medias/SA-WBM-2018-004.pdf?context=bWFzdGVyfHJvb3R8MjgyNzYwfGFwcGxpY2F0aW9uL3BkZnxoMWUvaDg4LzkzNjE3NTIxOTUxMDIucGRmfDU1NmJkYjEzNDY0ZGU4OWQ1OTMyMjUwNTlmZTI0MzgwNDQ1MDY1YzU3OWRmZDk1NzYzODAwMDI3ODg1NDJlZjU | third party advisory |
https://www.exploit-db.com/exploits/45014/ | exploit vdb entry third party advisory |
http://seclists.org/fulldisclosure/2018/Jul/38 | mailing list exploit third party advisory |