7.8
CVE-2024-11609
- EPSS 0.07%
- Veröffentlicht 30.01.2025 21:15:13
- Zuletzt bearbeitet 12.08.2025 15:10:28
- Quelle zdi-disclosures@trendmicro.com
- CVE-Watchlists
- Unerledigt
AutomationDirect C-More EA9 EAP9 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of AutomationDirect C-More EA9. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of EAP9 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24772.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Automationdirect ≫ C-more Ea9-t10cl Firmware Version <= 6.78
Automationdirect ≫ C-more Ea9-t10wcl Firmware Version <= 6.78
Automationdirect ≫ C-more Ea9-t12cl Firmware Version <= 6.78
Automationdirect ≫ C-more Ea9-t15cl Firmware Version <= 6.78
Automationdirect ≫ C-more Ea9-t15cl-r Firmware Version <= 6.78
Automationdirect ≫ C-more Ea9-t6cl Firmware Version <= 6.78
Automationdirect ≫ C-more Ea9-t6cl-r Firmware Version <= 6.78
Automationdirect ≫ C-more Ea9-t8cl Firmware Version <= 6.78
Automationdirect ≫ C-more Ea9-rhmi Firmware Version <= 6.78
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.07% | 0.223 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| zdi-disclosures@trendmicro.com | 7.8 | 1.8 | 5.9 |
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
CWE-121 Stack-based Buffer Overflow
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).