An exploitable clear text transmission of password vulnerability exists in the web server and telnet functionality of Moxa EDR-810 V4.1 build 17030317. An attacker can look at network traffic to get the admin password for the device. The attacker can then use the credentials to login as admin.
Moxa EDR-810 V4.1 build 17030317
https://www.moxa.com/product/EDR-810.htm
5.7 - CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CWE 317 - Cleartext Transmission of Sensitive Information
By default the device uses HTTP instead of HTTPS. Passwords are sent in clear text. An attacker can monitor network traffic for a password.
The following POST is sent with plain text credentials.
POST /init.asp HTTP/1.1
Host: 192.168.127.254
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://192.168.127.254/Login.asp
Cookie: NAME=admin; PASSWORD=d3bff8450106a52369b8b4dbca7b1b16; AUTHORITY=; sysnotify_support=yes; sysnotify_loginStatus=initial; lasttime=1509719511146; Auto- Logout_Time=300000; sessionID=1707101564
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 50
Username=admin&Password=moxa&Submit.x=0&Submit.y=0