WAGO e!DISPLAY Web-Based-Management
WAGO e!DISPLAY web-based management interfaces (models 762-3000, 762-3001, 762-3002, 762-3003 running firmware FW 01) contain cross-site scripting (XSS) vulnerabilities. These allow an authenticated attacker to execute arbitrary code in the user's browser context, place malicious files on the device filesystem, and potentially escalate privileges. Exploitation requires network access to the web interface and valid login credentials, but also requires tricking an authenticated user into visiting a malicious page.
- Network access to the device's web management interface (port 80/443)
- Valid login credentials (or default credentials if unchanged)
- User interaction required (the authenticated user must visit a malicious page or link)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/1242483a-1933-4471-b2e9-216359b01763Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.