Siemens SCALANCE W1750D
The SCALANCE W1750D wireless access point contains multiple vulnerabilities in its web interface and CLI that allow unauthenticated remote code execution, denial of service, or sensitive information disclosure. The vulnerabilities include buffer overflow flaws (CWE-120), improper input validation (CWE-20), and command injection (CWE-77). An unauthenticated attacker with network access to the device can exploit these to run arbitrary commands or crash the device. Siemens has released firmware version 8.10.0.9 to address these issues. Until patched, temporary mitigations include enabling cluster-security and restricting management interface access via VLAN or firewall rules.
- Network access to the SCALANCE W1750D management interface (web port or CLI)
- No credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/8f8099c2-ee9b-4fed-9cd5-be4367457a8bGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.