Share: Email | Twitter

ID

VDE-2025-040

Published

2025-06-16 12:00 (CEST)

Last update

2025-06-13 13:43 (CEST)

Vendor(s)

WAGO GmbH & Co. KG

Product(s)

Article No° Product Name Affected Version(s)
Edge Controller 0752-8303_8000-0002 < 2.6.9
Edge Controller 0752-8303_8000-0002 < 2.6.1

Summary

The base ctrlX OS apps Device Admin and Solutions contain multiple vulnerabilities. In a worst case scenario, a remote authenticated (low-privileged) attacker might be able to execute arbitrary OS commands running with higher privileges.

Vulnerabilities



Last Update
June 13, 2025, 1:29 p.m.
Weakness
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78)
Summary

A vulnerability in the “Remote Logging” functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to execute arbitrary OS commands in the context of user “root” via a crafted HTTP request.

Last Update
June 13, 2025, 1:23 p.m.
Weakness
Improper Neutralization of Script in an Error Message Web Page (CWE-81)
Summary

A vulnerability in the error notification messages of the web application of ctrlX OS allows a remote unauthenticated attacker to inject arbitrary HTML tags and, possibly, execute arbitrary client-side code in the context of another user's browser via a crafted HTTP request.

Last Update
June 13, 2025, 1:14 p.m.
Weakness
Improper Encoding or Escaping of Output (CWE-116)
Summary

A vulnerability in the “Manages app data” functionality of the web application of ctrlX OS allows a remote authenticated (lowprivileged) attacker to execute arbitrary client-side code in the context of another user's browser via multiple crafted HTTP requests.

Last Update
June 13, 2025, 1:22 p.m.
Weakness
Relative Path Traversal (CWE-23)
Summary

A vulnerability in the “Manages app data” functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to write arbitrary files in arbitrary file system paths via a crafted HTTP request.

Last Update
June 13, 2025, 1:28 p.m.
Weakness
Relative Path Traversal (CWE-23)
Summary

A vulnerability in the “Certificates and Keys” functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to write arbitrary certificates in arbitrary file system paths via a crafted HTTP request.

Last Update
June 13, 2025, 1:25 p.m.
Weakness
Improper Validation of Syntactic Correctness of Input (CWE-1286)
Summary

A vulnerability in the “Proxy” functionality of the web application of ctrlX OS allows a remote authenticated (lowprivileged) attacker to manipulate the “/etc/environment” file via a crafted HTTP request.

Last Update
June 13, 2025, 1:26 p.m.
Weakness
Improper Validation of Syntactic Correctness of Input (CWE-1286)
Summary

A vulnerability in the “Network Interfaces” functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to manipulate the network configuration file via a crafted HTTP request.

Last Update
June 13, 2025, 1:27 p.m.
Weakness
Improper Validation of Syntactic Correctness of Input (CWE-1286)
Summary

A vulnerability in the “Network Interfaces” functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to manipulate the wireless network configuration file via a crafted HTTP request.

Last Update
June 13, 2025, 1:27 p.m.
Weakness
Improper Validation of Syntactic Correctness of Input (CWE-1286)
Summary

A vulnerability in the “Network Interfaces” functionality of the web application of ctrlX OS allows a remote authenticated (lowprivileged) attacker to delete the configuration of physical network interfaces via a crafted HTTP request.

Last Update
June 13, 2025, 1:31 p.m.
Weakness
Cleartext Storage of Sensitive Information (CWE-312)
Summary

A vulnerability in the “Backup & Restore” functionality of the web application of ctrlX OS allows a remote authenticated (lowprivileged) attacker to access secret information via multiple crafted HTTP requests.

Last Update
June 13, 2025, 1:17 p.m.
Weakness
Use of Password Hash With Insufficient Computational Effort (CWE-916)
Summary

A vulnerability in the users configuration file of ctrlX OS may allow a remote authenticated (low-privileged) attacker to recover the plaintext passwords of other users.

Last Update
June 13, 2025, 1:19 p.m.
Weakness
Allocation of Resources Without Limits or Throttling (CWE-770)
Summary

A vulnerability in the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to induce a Denial-of-Service (DoS) condition on the device via multiple crafted HTTP requests. In the worst case, a full power cycle is needed to regain control of the device.

Last Update
June 13, 2025, 1:20 p.m.
Weakness
Observable Response Discrepancy (CWE-204)
Summary

A vulnerability in the login functionality of the web application of ctrlX OS allows a remote unauthenticated attacker to guess valid usernames via multiple crafted HTTP requests.

Last Update
June 13, 2025, 1:24 p.m.
Weakness
Improper Validation of Syntactic Correctness of Input (CWE-1286)
Summary

A vulnerability in the “Hosts” functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to manipulate the “hosts” file in an unintended manner via a crafted HTTP request.

Last Update
June 13, 2025, 1:38 p.m.
Weakness
Improper Neutralization of HTTP Headers for Scripting Syntax (CWE-644)
Summary

A vulnerability in the web application of ctrlX OS allows a remote unauthenticated attacker to conduct various attacks against users of the vulnerable system, including web cache poisoning or Man-in-the-Middle (MitM), via a crafted HTTP request.

Impact

This could lead to an escalation of privileges and give an attacker full access to the device.

Solution

Remediation

Update the following components:

  • Update Device Admin to version 2.6.9
  • Update Solutions to version 2.6.1

Reported by

CERT@VDE coordinated with WAGO GmbH & Co. KG