An exploitable HTTP Header Injection vulnerability exists in the Web Application functionality of the Moxa AWK-3131A Wireless Access Point running firmware 1.1. A specially crafted HTTP request can inject a payload in the bkpath parameter which will be copied in to Location header of the HTTP response.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
http://www.talosintelligence.com/reports/TALOS-2016-0234/ |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: talos
Published:
Updated: 2024-08-06T02:27:41.299Z
Reserved: 2016-10-17T00:00:00
Link: CVE-2016-8720

No data.

Status : Modified
Published: 2017-04-13T19:59:00.237
Modified: 2024-11-21T02:59:55.380
Link: CVE-2016-8720

No data.