As of June 15, 2022, this site no longer supports Internet Explorer. Please use another browser for the best experience on our site.

Product support

Security Advisories


EDS-405A/408A Series Multiple Web Vulnerabilities

Multiple web server vulnerabilities affect EDS-405A version 3.5 and earlier, as well as EDS-408A Series version 3.6 and earlier. These vulnerabilities arise from insufficient input validation and improper privilege management. An attacker could exploit these vulnerabilities by sending crafted HTTP input to the web service. Successful exploitation could lead to a denial-of-service attack, remote code execution, and privilege escalation. 

The identified vulnerability types and potential impacts are shown below:

Item Vulnerability Type Impact

Improper Privilege Management (CWE-269) 


An attacker could send crafted input to escalate privileges. 

Uncontrolled Resource Exhaustion (CWE-400) 


The embedded GoAhead web server running on the EDS-405A and EDS-408A is vulnerable to a denial-of-service attack. 

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (CWE-79) 


An input field in the administrative web interface lacks input validation, which could be abused to inject JavaScript code. 

Vulnerability Scoring Details 

CVSS v2.0
Unauthenticated Remote Exploit


AV:N/AC:L/Au:S/C:N/I:C/A:C  No 
CVE-2015-6465 6.8  AV:N/AC:L/Au:S/C:N/I:N/A:C  No 
CVE-2015-6466 4.3  AV:N/AC:M/Au:N/C:N/I:P/A:N  Yes

Affected Products:

The affected products and firmware versions are shown below.

Product Series Affected Versions
EDS-405A Series  Firmware version v3.5 and earlier versions  
EDS-408A Series  Firmware version v3.6 and earlier versions 



Moxa has developed appropriate solutions to address the vulnerabilities. The solutions for affected products are shown below.

Product Series Solutions
EDS-405A Series Please upgrade to firmware version 3.6 or later. 
EDS-408A Series  Please upgrade to firmware version 3.7 or later. 



  • Minimize network exposure to ensure the device is not accessible from the Internet. 
  • When remote access is required, use secure methods such as Virtual Private Networks (VPNs). 
  • Since all the above vulnerabilities originate from the web service, it is recommended to temporarily disable the web service after completing configuration. This will prevent further damage from these vulnerabilities until the patch or updated firmware is installed.  


Products That Are Not Vulnerable:

Only the products listed in the Affected Products section of this advisory are known to be affected by this vulnerability.



We would like to express our appreciation to Erwin Paternotte of Applied Risk for reporting the vulnerability, working with us to enhance the security of our products, and helping us provide better service to our customers. 


Revision History:

1.0 First Release Jun 27, 2024

Relevant Products

EDS-405A Series · EDS-408A Series ·

  •   Print this page
  • You can manage and share your saved list in My Moxa
Let’s get that fixed

If you are concerned about a potential cybersecurity vulnerability, please contact us and one of technical support staff will get in touch with you.

Report a Vulnerability
Added To Bag
You have some items waiting in your bag; click here to finish your quote!