Back to overview

WAGO: Vulnerabilities in ctrlX OS app

VDE-2025-040
Last update
06/16/2025 12:00
Published at
06/16/2025 12:00
Vendor(s)
WAGO GmbH & Co. KG
External ID
VDE-2025-040
CSAF Document

Summary

The base ctrlX OS apps Device Admin and Solutions contain multiple vulnerabilities. In a worst case scenario, a remote authenticated (low-privileged) attacker might be able to execute arbitrary OS commands running with higher privileges.

Impact

This could lead to an escalation of privileges and give an attacker full access to the device.

Affected Product(s)

Model no. Product name Affected versions
WAGO Hardware Edge Controller 0752-8303_8000-0002 Bosch Rexroth Software Solutions <2.6.1, Bosch Rexroth Software Device Admin <2.6.9

Vulnerabilities

Expand / Collapse all

Published
09/22/2025 14:57
Weakness
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78)
Summary

A vulnerability in the “Remote Logging” functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to execute arbitrary OS commands in the context of user “root” via a crafted HTTP request.

References

Published
09/22/2025 14:57
Weakness
Relative Path Traversal (CWE-23)
Summary

A vulnerability in the “Certificates and Keys” functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to write arbitrary certificates in arbitrary file system paths via a crafted HTTP request.

References

Published
09/22/2025 14:57
Weakness
Improper Neutralization of Script in an Error Message Web Page (CWE-81)
Summary

A vulnerability in the error notification messages of the web application of ctrlX OS allows a remote unauthenticated attacker to inject arbitrary HTML tags and, possibly, execute arbitrary client-side code in the context of another user’s browser via a crafted HTTP request.

References

Published
09/22/2025 14:57
Weakness
Relative Path Traversal (CWE-23)
Summary

A vulnerability in the “Manages app data” functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to write arbitrary files in arbitrary file system paths via a crafted HTTP request.

References

Published
09/22/2025 14:57
Weakness
Improper Encoding or Escaping of Output (CWE-116)
Summary

A vulnerability in the “Manages app data” functionality of the web application of ctrlX OS allows a remote authenticated (lowprivileged) attacker to execute arbitrary client-side code in the context of another user’s browser via multiple crafted HTTP requests.

References

Published
09/22/2025 14:57
Weakness
Cleartext Storage of Sensitive Information (CWE-312)
Summary

A vulnerability in the “Backup & Restore” functionality of the web application of ctrlX OS allows a remote authenticated (lowprivileged) attacker to access secret information via multiple crafted HTTP requests.

References

Published
09/22/2025 14:57
Weakness
Improper Validation of Syntactic Correctness of Input (CWE-1286)
Summary

A vulnerability in the “Network Interfaces” functionality of the web application of ctrlX OS allows a remote authenticated (lowprivileged) attacker to delete the configuration of physical network interfaces via a crafted HTTP request.

References

Published
09/22/2025 14:57
Weakness
Improper Validation of Syntactic Correctness of Input (CWE-1286)
Summary

A vulnerability in the “Network Interfaces” functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to manipulate the wireless network configuration file via a crafted HTTP request.

References

Published
09/22/2025 14:57
Weakness
Improper Validation of Syntactic Correctness of Input (CWE-1286)
Summary

A vulnerability in the “Network Interfaces” functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to manipulate the network configuration file via a crafted HTTP request.

References

Published
09/22/2025 14:57
Weakness
Improper Validation of Syntactic Correctness of Input (CWE-1286)
Summary

A vulnerability in the “Proxy” functionality of the web application of ctrlX OS allows a remote authenticated (lowprivileged) attacker to manipulate the “/etc/environment” file via a crafted HTTP request.

References

Published
09/22/2025 14:57
Weakness
Improper Validation of Syntactic Correctness of Input (CWE-1286)
Summary

A vulnerability in the “Hosts” functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to manipulate the “hosts” file in an unintended manner via a crafted HTTP request.

References

Published
09/22/2025 14:57
Weakness
Observable Response Discrepancy (CWE-204)
Summary

A vulnerability in the login functionality of the web application of ctrlX OS allows a remote unauthenticated attacker to guess valid usernames via multiple crafted HTTP requests.

References

Published
09/22/2025 14:57
Weakness
Allocation of Resources Without Limits or Throttling (CWE-770)
Summary

A vulnerability in the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to induce a Denial-of-Service (DoS) condition on the device via multiple crafted HTTP requests. In the worst case, a full power cycle is needed to regain control of the device.

References

Published
09/22/2025 14:57
Weakness
Use of Password Hash With Insufficient Computational Effort (CWE-916)
Summary

A vulnerability in the users configuration file of ctrlX OS may allow a remote authenticated (low-privileged) attacker to recover the plaintext passwords of other users.

References

Published
09/22/2025 14:57
Weakness
Improper Neutralization of HTTP Headers for Scripting Syntax (CWE-644)
Summary

A vulnerability in the web application of ctrlX OS allows a remote unauthenticated attacker to conduct various attacks against users of the vulnerable system, including web cache poisoning or Man-in-the-Middle (MitM), via a crafted HTTP request.

References

Remediation

Update the following components:
* Update Device Admin to version 2.6.9
* Update Solutions to version 2.6.1

Revision History

Version Date Summary
1 06/16/2025 12:00 Initial release.