WAGO Series 750-88x and 750-87x
A remote attacker can change settings or alter the programming of WAGO Series 750-88x and 750-87x compact controllers without authentication. The vulnerability exists in the web server interface that handles firmware uploads and device configuration. An unauthenticated attacker on the network can modify the device's program logic, change operational parameters, or upload malicious firmware. This affects 16 controller models. WAGO has not released firmware patches for these products and recommends implementing network controls as a compensating measure.
- Network access to the WAGO device web interface (typically HTTP port 80 or HTTPS port 443)
- No credentials required - the vulnerability affects the web server's authentication logic itself
Patching may require device reboot — plan for process interruption
/api/v1/advisories/c16809c7-62f7-4a0b-bf92-67620807b8f8Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.