Moxa NPort Device Vulnerabilities
Multiple critical vulnerabilities exist in Moxa NPort serial-to-Ethernet converters. The vulnerabilities include buffer overflow conditions (CWE-120), missing or weak authentication mechanisms (CWE-287, CWE-306), insufficient credentials handling (CWE-256), weak password requirements (CWE-307), cross-site request forgery (CWE-352), resource exhaustion (CWE-400), and cross-site scripting (CWE-79). These flaws allow remote attackers without authentication to execute arbitrary code, bypass access controls, and compromise device functionality. Affected devices range from older NPort 5110/5200 series to newer M12 industrial variants and NPort 6000/6110 series. No vendor patches are available for any affected product.
- Network access to the NPort device on port 502 or HTTP/HTTPS ports
- No authentication required for most vulnerabilities
- Device must be reachable from the attacker's network segment
Patching may require device reboot — plan for process interruption
/api/v1/advisories/5b45d32d-e8bd-4d4d-8a57-a79821cda671