Severity
7.0HIGH
EPSS
0.0%
top 84.79%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 23
Latest updateMay 24

Description

An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service "I/O-Check" functionality of WAGO PFC 200. An attacker can send a specially crafted packet to trigger the parsing of this cache file.At 0x1eb9c the extracted interface element name from the xml file is used as an argument to /etc/config-tools/config_interfaces interface= using sprintf(). The destination buffer sp+0x40 is overflowed with the call to sprintf() for any interface values that are greater t

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.0 | Impact: 5.9

Affected Packages2 packages

CVEListV5wagoWAGO PFC200 Firmware version 03.02.02(14)
NVDwago/pfc200_firmware03.02.02\(14\)

🔴Vulnerability Details

2
GHSA
GHSA-ccp7-rf73-6pq2: An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service "I/O-Check" functionality of WAGO PFC 2002022-05-24
CVEList
CVE-2019-5186: An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service "I/O-Check" functionality of WAGO PFC 2002020-03-23
CVE-2019-5186 (HIGH CVSS 7) | An exploitable stack buffer overflo | cvebase.io