weidmueller CVE Vulnerabilities & Metrics

Focus on weidmueller vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About weidmueller Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with weidmueller. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total weidmueller CVEs: 19
Earliest CVE date: 06 Dec 2019, 18:15 UTC
Latest CVE date: 14 Dec 2022, 09:15 UTC

Latest CVE reference: CVE-2022-3073

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical weidmueller CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 6.75

Max CVSS: 9.0

Critical CVEs (≥9): 7

CVSS Range vs. Count

Range Count
0.0-3.9 1
4.0-6.9 9
7.0-8.9 2
9.0-10.0 7

CVSS Distribution Chart

Top 5 Highest CVSS weidmueller CVEs

These are the five CVEs with the highest CVSS scores for weidmueller, sorted by severity first and recency.

All CVEs for weidmueller

CVE-2022-3073 weidmueller vulnerability CVSS: 0 14 Dec 2022, 09:15 UTC

Quanos "SCHEMA ST4" example web templates in version Bootstrap 2019 v2/2021 v1/2022 v1/2022 SP1 v1 or below are prone to JavaScript injection allowing a remote attacker to hijack existing sessions to e.g. other web services in the same environment or execute scripts in the users browser environment. The affected script is '*-schema.js'.

CVE-2021-33539 weidmueller vulnerability CVSS: 6.5 25 Jun 2021, 19:15 UTC

In Weidmueller Industrial WLAN devices in multiple versions an exploitable authentication bypass vulnerability exists in the hostname processing. A specially configured device hostname can cause the device to interpret selected remote traffic as local traffic, resulting in a bypass of web authentication. An attacker can send authenticated SNMP requests to trigger this vulnerability.

CVE-2021-33538 weidmueller vulnerability CVSS: 9.0 25 Jun 2021, 19:15 UTC

In Weidmueller Industrial WLAN devices in multiple versions an exploitable improper access control vulnerability exists in the iw_webs account settings functionality. A specially crafted user name entry can cause the overwrite of an existing user account password, resulting in remote shell access to the device as that user. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.

CVE-2021-33537 weidmueller vulnerability CVSS: 6.5 25 Jun 2021, 19:15 UTC

In Weidmueller Industrial WLAN devices in multiple versions an exploitable remote code execution vulnerability exists in the iw_webs configuration parsing functionality. A specially crafted user name entry can cause an overflow of an error message buffer, resulting in remote code execution. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.

CVE-2021-33536 weidmueller vulnerability CVSS: 5.0 25 Jun 2021, 19:15 UTC

In Weidmueller Industrial WLAN devices in multiple versions an exploitable denial-of-service vulnerability exists in ServiceAgent functionality. A specially crafted packet can cause an integer underflow, triggering a large memcpy that will access unmapped or out-of-bounds memory. An attacker can send this packet while unauthenticated to trigger this vulnerability.

CVE-2021-33535 weidmueller vulnerability CVSS: 6.5 25 Jun 2021, 19:15 UTC

In Weidmueller Industrial WLAN devices in multiple versions an exploitable format string vulnerability exists in the iw_console conio_writestr functionality. A specially crafted time server entry can cause an overflow of the time server buffer, resulting in remote code execution. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.

CVE-2021-33534 weidmueller vulnerability CVSS: 9.0 25 Jun 2021, 19:15 UTC

In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the hostname functionality. A specially crafted entry to network configuration information can cause execution of arbitrary system commands, resulting in full control of the device. An attacker can send various requests while authenticated as a high privilege user to trigger this vulnerability.

CVE-2021-33533 weidmueller vulnerability CVSS: 9.0 25 Jun 2021, 19:15 UTC

In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the iw_webs functionality. A specially crafted iw_serverip parameter can cause user input to be reflected in a subsequent iw_system call, resulting in remote control over the device. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.

CVE-2021-33532 weidmueller vulnerability CVSS: 9.0 25 Jun 2021, 19:15 UTC

In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the iw_webs functionality. A specially crafted diagnostic script file name can cause user input to be reflected in a subsequent iw_system call, resulting in remote control over the device. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.

CVE-2021-33531 weidmueller vulnerability CVSS: 9.0 25 Jun 2021, 19:15 UTC

In Weidmueller Industrial WLAN devices in multiple versions an exploitable use of hard-coded credentials vulnerability exists in multiple iw_* utilities. The device operating system contains an undocumented encryption password, allowing for the creation of custom diagnostic scripts. An attacker can send diagnostic scripts while authenticated as a low privilege user to trigger this vulnerability.

CVE-2021-33530 weidmueller vulnerability CVSS: 9.0 25 Jun 2021, 19:15 UTC

In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in encrypted diagnostic script functionality of the devices. A specially crafted diagnostic script file can cause arbitrary busybox commands to be executed, resulting in remote control over the device. An attacker can send diagnostic while authenticated as a low privilege user to trigger this vulnerability.

CVE-2021-33529 weidmueller vulnerability CVSS: 5.0 25 Jun 2021, 19:15 UTC

In Weidmueller Industrial WLAN devices in multiple versions the usage of hard-coded cryptographic keys within the service agent binary allows for the decryption of captured traffic across the network from or to the device.

CVE-2021-33528 weidmueller vulnerability CVSS: 9.0 25 Jun 2021, 19:15 UTC

In Weidmueller Industrial WLAN devices in multiple versions an exploitable privilege escalation vulnerability exists in the iw_console functionality. A specially crafted menu selection string can cause an escape from the restricted console, resulting in system access as the root user. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.

CVE-2021-20999 weidmueller vulnerability CVSS: 7.5 13 May 2021, 14:15 UTC

In Weidmüller u-controls and IoT-Gateways in versions up to 1.12.1 a network port intended only for device-internal usage is accidentally accessible via external network interfaces. By exploiting this vulnerability the device may be manipulated or the operation may be stopped.

CVE-2019-16674 weidmueller vulnerability CVSS: 5.0 06 Dec 2019, 18:15 UTC

An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Authentication Information used in a cookie is predictable and can lead to admin password compromise when captured on the network.

CVE-2019-16673 weidmueller vulnerability CVSS: 4.0 06 Dec 2019, 18:15 UTC

An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Passwords are stored in cleartext and can be read by anyone with access to the device.

CVE-2019-16672 weidmueller vulnerability CVSS: 5.0 06 Dec 2019, 18:15 UTC

An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Sensitive Credentials data is transmitted in cleartext.

CVE-2019-16671 weidmueller vulnerability CVSS: 6.8 06 Dec 2019, 18:15 UTC

An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Remote authenticated users can crash a device with a special packet because of Uncontrolled Resource Consumption.

CVE-2019-16670 weidmueller vulnerability CVSS: 7.5 06 Dec 2019, 18:15 UTC

An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. The Authentication mechanism has no brute-force prevention.