Moxa AWK-3131A Series Industrial AP/Bridge/Client Vulnerabilities
The Moxa AWK-3131A industrial access point series contains multiple critical vulnerabilities across all firmware versions: improper access control (CVE-2019-5136) allows low-privilege authenticated users to escalate to higher privileges; hardcoded cryptographic keys (CVE-2019-5137) enable decryption of captured network traffic; hardcoded credentials (CVE-2019-5139) provide direct administrative access; and multiple command injection flaws (CVE-2019-5138, CVE-2019-5140, CVE-2019-5141, CVE-2019-5142) allow authenticated attackers to execute arbitrary OS commands. A buffer overflow (CVE-2019-5143) may also be exploitable. Moxa has stated no firmware patch will be released for this end-of-life product line.
- Network access to AWK-3131A management or web interface (typically port 80/443 or SSH port 22)
- Low-privilege user credentials or default credentials
- Knowledge of the hardcoded cryptographic key or credentials (publicly disclosed)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/fa685a58-5dca-46b7-a101-8456eaf21d0e