Westermo Lynx 206-F2G
Westermo Lynx 206-F2G contains multiple web application vulnerabilities: cross-site scripting (XSS), code injection, cross-origin resource sharing (CORS) misconfiguration, and cross-site request forgery (CSRF). These flaws allow an authenticated attacker with network access to the web interface to inject and execute arbitrary code, steal sensitive information, or trigger unauthorized actions. The CSRF vulnerability was patched in a later WeOS4 version, but XSS, code injection, and CORS flaws will be addressed in future updates. Currently no patches are available for these flaws.
- Network access to Lynx web interface (port 80/443)
- Valid user credentials for web interface authentication
- Victim user must click a malicious link or visit attacker-controlled page (for CSRF/XSS variants)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/9c593717-a7d6-4825-83f7-311b0e003b33Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.