Vulnerabilities
Vulnerable Software
Wago:  Security Vulnerabilities
The MMS Interpreter of WagoAppRTU in versions below 1.4.6.0 which is used by the WAGO Telecontrol Configurator is vulnerable to malformed packets. An remote unauthenticated attacker could send specifically crafted packets that lead to a denial-of-service condition until restart of the affected device.
CVSS Score
7.5
EPSS Score
0.004
Published
2023-12-05
A vulnerability in the web-based management allows an unauthenticated remote attacker to inject arbitrary system commands and gain full system control. Those commands are executed with root privileges. The vulnerability is located in the user request handling of the web-based management.
CVSS Score
9.8
EPSS Score
0.003
Published
2023-11-21
Wago web-based management of multiple products has a vulnerability which allows an local authenticated attacker to change the passwords of other non-admin users and thus to escalate non-root privileges.
CVSS Score
5.3
EPSS Score
0.0
Published
2023-11-20
On affected Wago products an remote attacker with administrative privileges can access files to which he has already access to through an undocumented local file inclusion. This access is logged in a different log file than expected.
CVSS Score
2.7
EPSS Score
0.001
Published
2023-10-17
Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a malformed packet.
CVSS Score
4.9
EPSS Score
0.002
Published
2023-06-26
Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a specifically crafted packet to the CODESYS V2 runtime.
CVSS Score
4.9
EPSS Score
0.001
Published
2023-06-26
Uncontrolled resource consumption in Series WAGO 750-3x/-8x products may allow an unauthenticated remote attacker to DoS the MODBUS server with specially crafted packets.
CVSS Score
7.5
EPSS Score
0.002
Published
2023-06-26
In multiple products of WAGO a vulnerability allows an unauthenticated, remote attacker to create new users and change the device configuration which can result in unintended behaviour, Denial of Service and full system compromise.
CVSS Score
9.8
EPSS Score
0.936
Published
2023-05-15
The configuration backend of the web-based management is vulnerable to reflected XSS (Cross-Site Scripting) attacks that targets the users browser. This leads to a limited impact of confidentiality and integrity but no impact of availability.
CVSS Score
6.1
EPSS Score
0.001
Published
2023-02-27
The configuration backend of the web-based management can be used by unauthenticated users, although only authenticated users should be able to use the API. The vulnerability allows an unauthenticated attacker to read and set several device parameters that can lead to full compromise of the device.
CVSS Score
9.8
EPSS Score
0.002
Published
2023-02-27


Contact Us

Shodan ® - All rights reserved