Moxa EDR-810 Series Secure Router Vulnerabilities
Multiple critical vulnerabilities were identified in Moxa EDR-810 Series industrial secure routers affecting all versions. Vulnerability types include: improper input validation allowing remote code execution via crafted HTTP requests and denial of service via DHCP/SNMP/SSH password authentication; buffer overflow in SSH privilege-separation; exposure of process memory data through malformed TLS; outdated cryptographic protocols (SSLv3, TLSv1.0) enabling man-in-the-middle attacks and plaintext recovery; and improper access control on the console. These vulnerabilities allow remote attackers to execute arbitrary code, cause denial of service, decrypt encrypted traffic, or obtain sensitive information without authentication. Moxa has stated no patches will be provided for this end-of-life product line.
- Network access to the EDR-810 on ports 80, 443, 22, or 161 (HTTP, HTTPS, SSH, SNMP)
- No authentication required for HTTP-based remote code execution or DHCP-based denial of service
- Physical console access may be required for some privilege escalation paths
/api/v1/advisories/e2f278ed-a599-4c9d-acae-d1945ba4705f