A vulnerability in the web-based management allows an unauthenticated remote malicious user to inject arbitrary system commands and gain full system control. Those commands are executed with root privileges. The vulnerability is located in the user request handling of the web-based management.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
wago 0852-0602_firmware |
||
wago 0852-0603_firmware |
||
wago 0852-1605_firmware |