CVE-2024-11610
moderate-risk
Published 2025-01-30
AutomationDirect C-More EA9 EAP9 File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of AutomationDirect C-More EA9. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of EAP9 files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24773.
Do I need to act?
~
1.5% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.8/10
High
LOCAL
/ LOW complexity
Affected Products (9)
C-More Ea9-T10Cl Firmware
C-More Ea9-T10Wcl Firmware
C-More Ea9-T12Cl Firmware
C-More Ea9-T15Cl Firmware
C-More Ea9-T15Cl-R Firmware
C-More Ea9-T6Cl Firmware
C-More Ea9-T6Cl-R Firmware
C-More Ea9-T8Cl Firmware
C-More Ea9-Rhmi Firmware
Affected Vendors
References (2)
Third Party Advisory
https://certvde.com/en/bulletins/bulletins/2182-automationdirect-c-more-ea9-prog...
Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-24-1674/
43
/ 100
moderate-risk
Severity
24/34 · High
Exploitability
4/34 · Minimal
Exposure
15/34 · Moderate