An exploitable OS Command Injection vulnerability exists in the Telnet, SSH, and console login functionality of Moxa AWK-3131A Industrial IEEE 802.11a/b/g/n wireless AP/bridge/client in firmware versions 1.4 to 1.7 (current). An attacker can inject commands via the username parameter of several services (SSH, Telnet, console), resulting in remote, unauthenticated, root-level operating system command execution.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: talos
Published:
Updated: 2024-09-16T23:55:35.997Z
Reserved: 2017-09-13T00:00:00
Link: CVE-2017-14459

No data.

Status : Modified
Published: 2018-04-11T16:29:00.213
Modified: 2024-11-21T03:12:50.197
Link: CVE-2017-14459

No data.