CVE-2018-12981

An issue was discovered on WAGO e!DISPLAY 762-3000 through 762-3003 devices with firmware before FW 02. The vulnerability can be exploited by authenticated and unauthenticated users by sending special crafted requests to the web server allowing injecting code within the WBM. The code will be rendered and/or executed in the browser of the user's browser.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:wago:762-3000_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wago:762-3000:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:wago:762-3001_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wago:762-3001:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:wago:762-3002_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wago:762-3002:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:wago:762-3003_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wago:762-3003:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:46

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2018/Jul/38 - Exploit, Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2018/Jul/38 - Exploit, Mailing List, Third Party Advisory
References () https://cert.vde.com/en-us/advisories/vde-2018-010 - Third Party Advisory () https://cert.vde.com/en-us/advisories/vde-2018-010 - Third Party Advisory
References () https://ics-cert.us-cert.gov/advisories/ICSA-18-198-02 - Third Party Advisory, US Government Resource () https://ics-cert.us-cert.gov/advisories/ICSA-18-198-02 - Third Party Advisory, US Government Resource
References () https://www.exploit-db.com/exploits/45014/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/45014/ - Exploit, Third Party Advisory, VDB Entry
References () https://www.sec-consult.com/en/blog/advisories/remote-code-execution-via-multiple-attack-vectors-in-wago-edisplay/ - Exploit, Third Party Advisory () https://www.sec-consult.com/en/blog/advisories/remote-code-execution-via-multiple-attack-vectors-in-wago-edisplay/ - Exploit, Third Party Advisory
References () https://www.wago.com/medias/SA-WBM-2018-004.pdf?context=bWFzdGVyfHJvb3R8MjgyNzYwfGFwcGxpY2F0aW9uL3BkZnxoMWUvaDg4LzkzNjE3NTIxOTUxMDIucGRmfDU1NmJkYjEzNDY0ZGU4OWQ1OTMyMjUwNTlmZTI0MzgwNDQ1MDY1YzU3OWRmZDk1NzYzODAwMDI3ODg1NDJlZjU - Third Party Advisory () https://www.wago.com/medias/SA-WBM-2018-004.pdf?context=bWFzdGVyfHJvb3R8MjgyNzYwfGFwcGxpY2F0aW9uL3BkZnxoMWUvaDg4LzkzNjE3NTIxOTUxMDIucGRmfDU1NmJkYjEzNDY0ZGU4OWQ1OTMyMjUwNTlmZTI0MzgwNDQ1MDY1YzU3OWRmZDk1NzYzODAwMDI3ODg1NDJlZjU - Third Party Advisory

Information

Published : 2018-07-12 18:29

Updated : 2024-11-21 03:46


NVD link : CVE-2018-12981

Mitre link : CVE-2018-12981

CVE.ORG link : CVE-2018-12981


JSON object : View

Products Affected

wago

  • 762-3002
  • 762-3001
  • 762-3000_firmware
  • 762-3001_firmware
  • 762-3002_firmware
  • 762-3003
  • 762-3000
  • 762-3003_firmware
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')