Known vulnerabilities in Moxa Moxa EDR-810

CSH
CYBERSECURITY HELP
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
[] 
Main › Vulnerability Database › Moxa › Moxa EDR-810

Known vulnerabilities in Moxa Moxa EDR-810

Vendor: Moxa
Website: https://www.moxa.com/
Total Security Bulletins: 11
4.2 4.1 5.12.29 5.12.28 5.12.13 5.12 5.11 5.10 5.8 5.9 5.7 5.6 5.4 5.3 5.2 5.1 5.0 4.0 3.12 3.11

Security bulletins (11)

Secuity bulletin Severity Status Published
SB2023110627: Denial of service in Moxa EDR-810/G902/G903 Series Medium
Patched
06.11.2023
SB2022112812: Multiple vulnerabilities in Moxa Secure Router EDR and TN Series High
Patched
28.11.2022
SB2022112502: Multiple vulnerabilities in Moxa Routers High
Patched
25.11.2022
SB2022011008: Multiple vulnerabilities in Moxa EDR-G903, EDR-G902 and EDR-810 Series Secure Routers Medium
Patched
10.01.2022
SB2020110311: Denial of service in Moxa EDR-G903, EDR-G902 and EDR-810 Medium
Patched
03.11.2020
SB2020110310: Multiple vulnerabilities in Moxa EDR-810 Series High
Patched
03.11.2020
SB2019100203: Multiple vulnerabilities in Moxa’s EDR-810 Series Secure Routers Medium
Patched Public exploit
02.10.2019
SB2019100202: Stack-based buffer overflow in Moxa’s EDR-810 Series Secure Routers High
Patched
02.10.2019
SB2019100226: Remote code execution in Moxa EDR-810 High
Patched
02.10.2019
SB2018041804: Multiple vulnerabilities in Moxa EDR-810 Low
Patched
18.04.2018
SB2016102005: Privilege escalation in Moxa EDR-810 High
Patched
20.10.2016


Terms of Use|Privacy Policy|Contacts

© 2026 Cybersecurity Help s.r.o.


Cookie Settings

We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic.

Necessary

Required for basic site functionality

Google Analytics

Helps us understand how visitors use our site

Learn more in our Privacy Policy

Please verify you're human

Complete the CAPTCHA below or accept cookies to continue browsing.

or