Moxa AWK-3131A/4131A/1131A/1137C Series Wireless AP/Bridge/Client Vulnerabilities
Multiple vulnerabilities identified in Moxa AWK-3131A/4131A/1131A/1137C Series Wireless AP/Bridge/Client devices:\n\n1. Command Injection (CVE-2021-37752): Remote arbitrary command execution via web interface\n2. Authentication Bypass (CVE-2021-37753, CVE-2021-37755): Remote bypass of authentication and exposure of unencrypted credentials\n3. Buffer Overflow (CVE-2021-37757): Remote denial of service via improper input restriction\n4. Information Disclosure (CVE-2021-37751): Remote extraction of sensitive information\n5. Brute Force (CVE-2021-37754): Weak rate limiting allows credential guessing\n6. Cross-Site Scripting (CVE-2021-37756): Remote injection of HTML/JavaScript via web interface\n7. Firmware Verification (CVE-2021-37758): Improper verification allows malicious firmware installation\n\nAll versions of these products are affected. Moxa has indicated it is developing solutions but no fixed versions have been released.
- Network access to the device's web interface (port 80/443)
- No valid credentials required for command injection and information disclosure vulnerabilities
- Device must be reachable from the attacker's network segment
Patching may require device reboot — plan for process interruption
/api/v1/advisories/f81d991c-20d7-4635-9062-38fc2f3d275e