Vulnerable Systems:
* WAGO WAGO 758-874 0 and prior
Successful attacks can allow an attacker to obtain sensitive information, bypass certain security restrictions, and perform unauthorized administrative actions.
Vendor Status:
Currently we are not aware of any vendor-supplied patches
Disclosure Timeline:
Published:Jan 20 2012
Updated: Jun 19 2012