Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| WAGO | Compact Controller CC100 | FW20 ~ FW22 | - | |
| WAGO | Edge Controller | FW22 | - | |
| WAGO | PFC100 | FW20 ~ FW22 | - | |
| WAGO | PFC200 | FW20 ~ FW22 | - | |
| WAGO | Touch Panel 600 Advanced Line | FW22 | - | |
| WAGO | Touch Panel 600 Marine Line | FW22 | - | |
| WAGO | Touch Panel 600 Standard Line | FW22 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | WAGO Remote Exploit Tool for CVE-2023-1698 | https://github.com/Chocapikk/CVE-2023-1698 | POC Details |
| 2 | None | https://github.com/deIndra/CVE-2023-1698 | POC Details |
| 3 | WAGO系统远程代码执行漏洞(CVE-2023-1698) | https://github.com/thedarknessdied/WAGO-CVE-2023-1698 | POC Details |
| 4 | CVE-2023-1698 Proof of Concept (PoC) | https://github.com/X3RX3SSec/CVE-2023-1698 | POC Details |
| 5 | In multiple products of WAGO, a vulnerability allows an unauthenticated, remote attacker to create new users and change the device configuration which can result in unintended behavior, Denial of Service, and full system compromise. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-1698.yaml | POC Details |
| 6 | CVE-2023-1698 exploit with golang | https://github.com/ibrahmsql/CVE-2023-1698 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet