eWON Vulnerabilities
eWON sa industrial routers contain multiple critical vulnerabilities in firmware versions before 10.1s0, including improper authentication (CWE-613, CWE-352), weak password controls (CWE-274), cross-site scripting (CWE-79), information disclosure (CWE-200), and exposure of sensitive headers (CWE-598). These vulnerabilities allow an authenticated attacker to execute code, escalate privileges, modify device configuration, or bypass security controls. The vendor has not released a patched firmware version.
- Valid credentials (username/password) to the eWON management interface
- Network access to the eWON web interface (typically port 80/443)
- Knowledge of the eWON API or web interface structure
Patching may require device reboot — plan for process interruption
/api/v1/advisories/95b9f73b-bb0d-4693-8d45-5c3f5efd6b29Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.