OpenPLC Webserver 3 Denial Of Service / Buffer Overflow

Secure your products with top-tier expert knowledge and advanced Penetration Testing (CREST Approved)

Let's collaborate to build and maintain secure, trustworthy products

We transform threats into trust by integrating advanced tech and expertise in product security. Our approach encompasses Security by Design, rigorous security assurance and penetration testing, and compliance through expert documentation, from design to post-market. We offer CREST-approved pen testing in EMEA, upholding top security standards.

CREST Approved in EMEA

A buffer overflow vulnerability in OpenPLC Runtime’s webserver version 3 allows attackers to inject malicious code, leading to an internal server error that is irrecoverable. This also disables the ability to add any new slave devices through the “Add Slave Devices” component on the Modbus page of the application.   Exploit Files ≈ Packet Storm 

 

More To Explore