CVE-2017-14459
Severity CVSS v4.0:
Pending analysis
Type:
CWE-78
OS Command Injections
Publication date:
11/04/2018
Last modified:
19/04/2022
Description
An exploitable OS Command Injection vulnerability exists in the Telnet, SSH, and console login functionality of Moxa AWK-3131A Industrial IEEE 802.11a/b/g/n wireless AP/bridge/client in firmware versions 1.4 to 1.7 (current). An attacker can inject commands via the username parameter of several services (SSH, Telnet, console), resulting in remote, unauthenticated, root-level operating system command execution.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:moxa:awk-3131a_firmware:1.4:*:*:*:*:*:*:* | ||
| cpe:2.3:o:moxa:awk-3131a_firmware:1.5:*:*:*:*:*:*:* | ||
| cpe:2.3:o:moxa:awk-3131a_firmware:1.6:*:*:*:*:*:*:* | ||
| cpe:2.3:o:moxa:awk-3131a_firmware:1.7:*:*:*:*:*:*:* | ||
| cpe:2.3:h:moxa:awk-3131a:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



