3S-Smart Software Solutions GmbH CODESYS V3 Web Server
The CODESYS V3 web server component (CmpWebServer) contains path traversal and buffer overflow vulnerabilities that allow unauthenticated remote attackers to access restricted files or execute arbitrary code. The vulnerabilities affect all versions of CODESYS Control runtime systems prior to 3.5.14.10, including embedded runtimes for Beckhoff CX controllers, WAGO PFC200/PFC100, Raspberry Pi, BeagleBone, and Linux-based systems. Exploitation requires only network access to the web server port and does not require valid credentials or user interaction. Successful exploitation can result in complete compromise of the controller, allowing arbitrary code execution, file access, or denial of service.
- Network access to the CODESYS web server port (default 8080)
- CODESYS web server must be enabled on the target device
- No authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/6cd9eb3b-bbf5-42ea-b864-c073fa4faf61