WAGO I/O-CHECK
WAGO I/O-CHECK service on PFC100 and PFC200 series controllers contains multiple vulnerabilities (CWE-201, CWE-805, CWE-306, CWE-120) that allow unauthenticated remote code execution. Successful exploitation enables an attacker to modify device settings, delete applications, execute arbitrary code, crash the system, trigger denial-of-service conditions, reset to factory defaults, or overwrite MAC addresses. The I/O-CHECK service listens on TCP port 6626 and is enabled by default, but is only required during installation and commissioning.
- Network access to TCP port 6626 on the WAGO controller
- The I/O-CHECK service must be running (enabled by default)
- No valid credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/00e48f98-7e96-4135-98d3-9cf775cbd158Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.