module

MOXA Device Manager Tool 2.1 Buffer Overflow

Disclosed
2010-10-20
Created
2018-05-30

Description

This module exploits a stack buffer overflow in MOXA MDM Tool 2.1.
When sending a specially crafted MDMGw (MDM2_Gateway) response, an
attacker may be able to execute arbitrary code.

Authors

Ruben Santamarta
MC mc@metasploit.com

Platform

Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/windows/scada/moxa_mdmtool
msf exploit(moxa_mdmtool) > show targets
...targets...
msf exploit(moxa_mdmtool) > set TARGET < target-id >
msf exploit(moxa_mdmtool) > show options
...show and set options...
msf exploit(moxa_mdmtool) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.