Summary
Several vulnerabilities have been identified in the WAGO 852‑1328 device's web‑based management interface, which is implemented using a modified lighttpd server and custom CGI binaries. These issues include multiple stack buffer overflows, an authentication bypass, and insecure credential storage.
Impact
Successful exploitation may allow remote attackers to crash the web service, execute arbitrary code, bypass authentication controls, and obtain plaintext administrative credentials.
Affected Product(s)
| Model no. | Product name | Affected versions |
|---|---|---|
| 0852-1322 | 0852-1322 | Firmware 2.64, Firmware vers:generic/<=2.64 |
| 0852-1328 | 0852-1328 | Firmware vers:generic/<=2.64, Firmware 2.64 |
Vulnerabilities
Expand / Collapse allUser credentials are stored using AES‑ECB encryption with a hardcoded key. An unauthenticated remote attacker obtaining the configuration file can decrypt and recover plaintext usernames and passwords, especially when combined with the authentication bypass.
Improper length handling when parsing multiple cookie fields (including TRACKID) allows an unauthenticated remote attacker to send oversized cookie values and trigger a stack buffer overflow, resulting in a denial‑of‑service condition and possible remote code execution.
An unauthenticated remote attacker can send a crafted HTTP request containing an overly long SESSIONID cookie. This can trigger a stack buffer overflow in the modified lighttpd server, causing it to crash and potentially enabling remote code execution due to missing stack protections.
An unauthenticated remote attacker can bypass authentication by exploiting insufficient URI validation and using path traversal sequences (e.g., /js/../cgi-bin/post.cgi), gaining unauthorized access to protected CGI endpoints and configuration downloads.
Remediation
Please update your devices to the specified fixed firmware version 02.65.
Acknowledgments
WAGO GmbH & Co. KG thanks the following parties for their efforts:
- CERT@VDE for coordination
- Diconium for reporting
Revision History
| Version | Date | Summary |
|---|---|---|
| 1.0.0 | 02/09/2026 09:00 | Release version. |