The configuration backend of the web-based management can be used by unauthenticated users, although only authenticated users should be able to use the API. The vulnerability allows an unauthenticated malicious user to read and set several device parameters that can lead to full compromise of the device.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
wago 751-9301 firmware |
||
wago 751-9301 firmware 22 |
||
wago 751-9301 firmware 23 |
||
wago 752-8303/8000-002 firmware |
||
wago 752-8303/8000-002 firmware 22 |
||
wago 752-8303/8000-002 firmware 23 |
||
wago pfc100 firmware |
||
wago pfc100 firmware 22 |
||
wago pfc100 firmware 23 |
||
wago pfc200 firmware |
||
wago pfc200 firmware 22 |
||
wago pfc200 firmware 23 |
||
wago touch panel 600 advanced firmware |
||
wago touch panel 600 advanced firmware 22 |
||
wago touch panel 600 advanced firmware 23 |
||
wago touch panel 600 marine firmware |
||
wago touch panel 600 marine firmware 22 |
||
wago touch panel 600 marine firmware 23 |
||
wago touch panel 600 standard firmware |
||
wago touch panel 600 standard firmware 22 |
||
wago touch panel 600 standard firmware 23 |