WAGO: Multiple Vulnerabilities in I/O-Check Service in Multiple Devices
Multiple input validation vulnerabilities exist in the I/O-Check service running on WAGO PFC100 and PFC200 controllers and related models. The service listens on TCP/UDP port 6626 and is enabled by default. A remote attacker can send specially crafted packets to cause buffer overflows (CWE-787), information disclosure (CWE-200), or bypass authorization checks (CWE-306). Exploitation results in remote code execution, unauthorized configuration changes, application deletion, factory reset, or denial of service. The I/O-Check service is only needed during installation and commissioning, not for normal operation. Most affected products can be patched to firmware FW15 or later; the 750-891 has no vendor fix available.
- Network access to the device on port 6626 (I/O-Check service port)
- I/O-Check service enabled (enabled by default)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/f4656c1d-f72d-40dc-8a18-75e377046a26