Moxa TAP-323, WAC-1001, and WAC-2004 Series Wireless AP/Bridge/Client Vulnerabilities
Moxa TAP-323 Series and WAC-1001/2004 Series Railway Wireless Controllers contain multiple critical vulnerabilities spanning outdated software components: 1. CVE-2016-2148: Heap-based buffer overflow in DHCP client allows remote code execution. 2. CVE-2016-7406: Improper input validation in Dropbear SSH allows arbitrary code execution. 3. Multiple glibc vulnerabilities (CVE-2012-4412, CVE-2014-5119, CVE-2014-9402, CVE-2014-9984, CVE-2018-6485, CVE-2015-7547, CVE-2015-0235): Buffer overflow, integer overflow, and other memory safety issues in outdated GNU C Library enable remote code execution and denial of service. 4. Multiple Linux kernel vulnerabilities (CVE-2008-4609, CVE-2009-1298, CVE-2010-1162, CVE-2010-4251, CVE-2010-4805, CVE-2011-0709, CVE-2011-2525, CVE-2012-0207, CVE-2012-2136, CVE-2012-3552, CVE-2012-6638, CVE-2012-6701, CVE-2012-6704, CVE-2013-7470, CVE-2014-2523, CVE-2015-1465, CVE-2015-5364, CVE-2016-10229, CVE-2016-3134, CVE-2016-4997, CVE-2016-7039, CVE-2016-7117, CVE-2016-8666, CVE-2017-1000111, CVE-2017-11176, CVE-2017-7618, CVE-2017-8890, CVE-2019-16746, CVE-2019-3896, CVE-2010-3848, CVE-2012-0056, CVE-2010-2692): Privilege escalation, arbitrary command injection, denial of service via resource exhaustion, and memory corruption. 5. Hard-coded cryptographic keys ("House of Keys"): Enables unauthorized network access and authentication bypass.
- Network access to TCP port 22 (SSH) or UDP port 67/68 (DHCP)
- Device configured to use DHCP or expose SSH to untrusted networks
- No firewall rules restricting inbound network traffic to the controller
- Device running TAP-323, WAC-1001, or WAC-2004 firmware (any version)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/5292776b-1083-4232-b3ae-fe0186aace40