Software WAGO I O CHECK 3 14: A Windows Application for Operating and Displaying WAGO I/O System 750
- dozasot2018
- Aug 19, 2023
- 1 min read
In order to exercise this vulnerability, the attacker must place the malicious xml file at /tmp/iocheckCache.xml. All users have write access for /tmp and can write this file. The vulnerability can be triggered by sending the BC_SaveParameter message which will cause the iocheckCache.xml file to be parsed.
software wago i o check 3 14
2ff7e9595c
Comments