Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wago vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2023-4149
A vulnerability in the web-based management allows an unauthenticated remote malicious user to inject arbitrary system commands and gain full system control. Those commands are executed with root privileges. The vulnerability is located in the user request handling of the web-bas...
Wago 0852-0602 Firmware
Wago 0852-0603 Firmware
Wago 0852-1605 Firmware
9.8
CVSSv3
CVE-2023-1698
In multiple products of WAGO a vulnerability allows an unauthenticated, remote malicious user to create new users and change the device configuration which can result in unintended behaviour, Denial of Service and full system compromise.
Wago Compact Controller 100 Firmware
Wago Edge Controller Firmware 22
Wago Pfc100 Firmware
Wago Pfc200 Firmware
Wago Touch Panel 600 Advanced Firmware 22
Wago Touch Panel 600 Marine Firmware 22
Wago Touch Panel 600 Standard Firmware 22
3 Github repositories
9.8
CVSSv3
CVE-2022-45140
The configuration backend allows an unauthenticated user to write arbitrary data with root privileges to the storage, which could lead to unauthenticated remote code execution and full system compromise.
Wago 751-9301 Firmware
Wago 751-9301 Firmware 22
Wago 751-9301 Firmware 23
Wago 752-8303\\/8000-002 Firmware
Wago 752-8303\\/8000-002 Firmware 22
Wago 752-8303\\/8000-002 Firmware 23
Wago Pfc100 Firmware
Wago Pfc100 Firmware 22
Wago Pfc100 Firmware 23
Wago Pfc200 Firmware
Wago Pfc200 Firmware 22
Wago Pfc200 Firmware 23
Wago Touch Panel 600 Advanced Firmware
Wago Touch Panel 600 Advanced Firmware 22
Wago Touch Panel 600 Advanced Firmware 23
Wago Touch Panel 600 Marine Firmware
Wago Touch Panel 600 Marine Firmware 22
Wago Touch Panel 600 Marine Firmware 23
Wago Touch Panel 600 Standard Firmware
Wago Touch Panel 600 Standard Firmware 22
Wago Touch Panel 600 Standard Firmware 23
9.8
CVSSv3
CVE-2022-45138
The configuration backend of the web-based management can be used by unauthenticated users, although only authenticated users should be able to use the API. The vulnerability allows an unauthenticated malicious user to read and set several device parameters that can lead to full ...
Wago 751-9301 Firmware
Wago 751-9301 Firmware 22
Wago 751-9301 Firmware 23
Wago 752-8303\\/8000-002 Firmware
Wago 752-8303\\/8000-002 Firmware 22
Wago 752-8303\\/8000-002 Firmware 23
Wago Pfc100 Firmware
Wago Pfc100 Firmware 22
Wago Pfc100 Firmware 23
Wago Pfc200 Firmware
Wago Pfc200 Firmware 22
Wago Pfc200 Firmware 23
Wago Touch Panel 600 Advanced Firmware
Wago Touch Panel 600 Advanced Firmware 22
Wago Touch Panel 600 Advanced Firmware 23
Wago Touch Panel 600 Marine Firmware
Wago Touch Panel 600 Marine Firmware 22
Wago Touch Panel 600 Marine Firmware 23
Wago Touch Panel 600 Standard Firmware
Wago Touch Panel 600 Standard Firmware 22
Wago Touch Panel 600 Standard Firmware 23
9.8
CVSSv3
CVE-2021-34569
In WAGO I/O-Check Service in multiple products an attacker can send a specially crafted packet containing OS commands to crash the diagnostic tool and write memory.
Wago 750-8100 Firmware
Wago 750-8100 Firmware 18
Wago 750-8101 Firmware
Wago 750-8101 Firmware 18
Wago 750-8101\\/025-000 Firmware
Wago 750-8101\\/025-000 Firmware 18
Wago 750-8102 Firmware
Wago 750-8102 Firmware 18
Wago 750-8102\\/025-000 Firmware
Wago 750-8102\\/025-000 Firmware 18
Wago 750-8202 Firmware
Wago 750-8202 Firmware 18
Wago 750-8202\\/000-011 Firmware
Wago 750-8202\\/000-011 Firmware 18
Wago 750-8202\\/000-012 Firmware
Wago 750-8202\\/000-012 Firmware 18
Wago 750-8202\\/000-022 Firmware
Wago 750-8202\\/000-022 Firmware 18
Wago 750-8202\\/025-000 Firmware
Wago 750-8202\\/025-000 Firmware 18
Wago 750-8202\\/025-001 Firmware
Wago 750-8202\\/025-001 Firmware 18
9.8
CVSSv3
CVE-2021-20998
In multiple managed switches by WAGO in different versions without authorization and with specially crafted packets it is possible to create users.
Wago 0852-0303 Firmware
Wago 0852-1305 Firmware
Wago 0852-1505 Firmware
Wago 0852-1305\\/000-001 Firmware
Wago 0852-1505\\/000-001 Firmware
9.8
CVSSv3
CVE-2020-12522
The reported vulnerability allows an attacker who has network access to the device to execute code with specially crafted packets in WAGO Series PFC 100 (750-81xx/xxx-xxx), Series PFC 200 (750-82xx/xxx-xxx), Series Wago Touch Panel 600 Standard Line (762-4xxx), Series Wago Touch ...
Wago Pfc 100 Firmware
Wago Pfc 200 Firmware
Wago Touch Panel 600 Standard Firmware
Wago Touch Panel 600 Advanced Firmware
Wago Touch Panel 600 Marine Firmware
9.8
CVSSv3
CVE-2020-8597
eap.c in pppd in ppp 2.4.2 up to and including 2.4.8 has an rhostname buffer overflow in the eap_request and eap_response functions.
Point-to-point Protocol Project Point-to-point Protocol
Wago Pfc Firmware
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 12.04
6 Github repositories
9.8
CVSSv3
CVE-2019-5082
An exploitable heap buffer overflow vulnerability exists in the iocheckd service I/O-Check functionality of WAGO PFC200 Firmware version 03.01.07(13), WAGO PFC200 Firmware version 03.00.39(12), and WAGO PFC100 Firmware version 03.00.39(12). A specially crafted set of packets can ...
Wago Pfc200 Firmware 03.00.39\\(12\\)
Wago Pfc200 Firmware 03.01.07\\(13\\)
Wago Pfc100 Firmware 03.00.39\\(12\\)
9.8
CVSSv3
CVE-2019-5075
An exploitable stack buffer overflow vulnerability exists in the command line utility getcouplerdetails of WAGO PFC200 Firmware versions 03.01.07(13) and 03.00.39(12), and WAGO PFC100 Firmware version 03.00.39(12). A specially crafted set of packets sent to the iocheckd service &...
Wago Pfc 200 Firmware 03.00.39\\(12\\)
Wago Pfc 200 Firmware 03.01.07\\(13\\)
Wago Pfc 100 Firmware 03.00.39\\(12\\)
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »