### [CVE-2012-6068](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6068) ![](https://img.shields.io/static/v1?label=Product&message=CECX-X-C1%20Modular%20Master%20Controller%20with%20CoDeSys&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=CECX-X-M1%20Modular%20Controller%20with%20CoDeSys%20and%20SoftMotion&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=CODESYS%20Control%20RTE&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=CODESYS%20Control%20Runtime%20embedded&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=CODESYS%20Control%20Runtime%20full&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=CoDeSys&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=All%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-284&color=brightgreen) ### Description The Runtime Toolkit in CODESYS Runtime System 2.3.x and 2.4.x does not require authentication, which allows remote attackers to execute commands via the command-line interface in the TCP listener service or transfer files via requests to the TCP listener service. ### POC #### Reference - http://www.digitalbond.com/tools/basecamp/3s-codesys/ #### Github No PoCs found on GitHub currently.