Moxa AWK-3121 Series Industrial AP/Bridge/Client Vulnerabilities
The Moxa AWK-3121 Series industrial wireless access point contains multiple critical vulnerabilities across 10 CVE identifiers spanning command injection (CWE-77), cross-site scripting (CWE-79), buffer overflow (CWE-119), insecure credential management (CWE-255), improper access control (CWE-284), and CSRF (CWE-352). The command injection vulnerabilities affect multiple parameters and allow arbitrary shell command execution. The device ships with insecure defaults: unencrypted HTTP for web management, an open unencrypted Wi-Fi network requiring no password, and an enabled unencrypted TELNET service. The web interface is also vulnerable to XSS attacks capable of stealing session cookies and lacks CSRF protection. Additionally, system logs can be downloaded without proper authorization. No fix is currently available from Moxa.
- Network reachability to the device's web interface (port 80 or default HTTP port)
- Or proximity to open Wi-Fi SSID broadcast by the device
- Or network reachability to TELNET port (23) for unencrypted access
- No valid credentials required for Wi-Fi connection (open network)
- No authentication required for some command injection vectors
/api/v1/advisories/ecb9e740-e675-4d3a-9a09-92a725c8903b