Description
AutomationDirect C-More EA9 EAP9 File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of AutomationDirect C-More EA9. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of EAP9 files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24774.
Published: 2025-01-30
Score: 7.8 High
EPSS: 1.5% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-34402 AutomationDirect C-More EA9 EAP9 File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of AutomationDirect C-More EA9. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of EAP9 files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24774.
History

Tue, 12 Aug 2025 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Automationdirect
Automationdirect c-more Ea9-rhmi
Automationdirect c-more Ea9-rhmi Firmware
Automationdirect c-more Ea9-t10cl
Automationdirect c-more Ea9-t10cl Firmware
Automationdirect c-more Ea9-t10wcl
Automationdirect c-more Ea9-t10wcl Firmware
Automationdirect c-more Ea9-t12cl
Automationdirect c-more Ea9-t12cl Firmware
Automationdirect c-more Ea9-t15cl
Automationdirect c-more Ea9-t15cl-r
Automationdirect c-more Ea9-t15cl-r Firmware
Automationdirect c-more Ea9-t15cl Firmware
Automationdirect c-more Ea9-t6cl
Automationdirect c-more Ea9-t6cl-r
Automationdirect c-more Ea9-t6cl-r Firmware
Automationdirect c-more Ea9-t6cl Firmware
Automationdirect c-more Ea9-t8cl
Automationdirect c-more Ea9-t8cl Firmware
CPEs cpe:2.3:h:automationdirect:c-more_ea9-rhmi:-:*:*:*:*:*:*:*
cpe:2.3:h:automationdirect:c-more_ea9-t10cl:*:*:*:*:*:*:*:*
cpe:2.3:h:automationdirect:c-more_ea9-t10wcl:*:*:*:*:*:*:*:*
cpe:2.3:h:automationdirect:c-more_ea9-t12cl:*:*:*:*:*:*:*:*
cpe:2.3:h:automationdirect:c-more_ea9-t15cl-r:*:*:*:*:*:*:*:*
cpe:2.3:h:automationdirect:c-more_ea9-t15cl:*:*:*:*:*:*:*:*
cpe:2.3:h:automationdirect:c-more_ea9-t6cl-r:*:*:*:*:*:*:*:*
cpe:2.3:h:automationdirect:c-more_ea9-t6cl:*:*:*:*:*:*:*:*
cpe:2.3:h:automationdirect:c-more_ea9-t8cl:*:*:*:*:*:*:*:*
cpe:2.3:o:automationdirect:c-more_ea9-rhmi_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:automationdirect:c-more_ea9-t10cl_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:automationdirect:c-more_ea9-t10wcl_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:automationdirect:c-more_ea9-t12cl_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:automationdirect:c-more_ea9-t15cl-r_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:automationdirect:c-more_ea9-t15cl_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:automationdirect:c-more_ea9-t6cl-r_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:automationdirect:c-more_ea9-t6cl_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:automationdirect:c-more_ea9-t8cl_firmware:*:*:*:*:*:*:*:*
Vendors & Products Automationdirect
Automationdirect c-more Ea9-rhmi
Automationdirect c-more Ea9-rhmi Firmware
Automationdirect c-more Ea9-t10cl
Automationdirect c-more Ea9-t10cl Firmware
Automationdirect c-more Ea9-t10wcl
Automationdirect c-more Ea9-t10wcl Firmware
Automationdirect c-more Ea9-t12cl
Automationdirect c-more Ea9-t12cl Firmware
Automationdirect c-more Ea9-t15cl
Automationdirect c-more Ea9-t15cl-r
Automationdirect c-more Ea9-t15cl-r Firmware
Automationdirect c-more Ea9-t15cl Firmware
Automationdirect c-more Ea9-t6cl
Automationdirect c-more Ea9-t6cl-r
Automationdirect c-more Ea9-t6cl-r Firmware
Automationdirect c-more Ea9-t6cl Firmware
Automationdirect c-more Ea9-t8cl
Automationdirect c-more Ea9-t8cl Firmware

Thu, 06 Feb 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 30 Jan 2025 20:30:00 +0000

Type Values Removed Values Added
Description AutomationDirect C-More EA9 EAP9 File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of AutomationDirect C-More EA9. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of EAP9 files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24774.
Title AutomationDirect C-More EA9 EAP9 File Parsing Memory Corruption Remote Code Execution Vulnerability
Weaknesses CWE-119
References
Metrics cvssV3_0

{'score': 7.8, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Subscriptions

Automationdirect C-more Ea9-rhmi C-more Ea9-rhmi Firmware C-more Ea9-t10cl C-more Ea9-t10cl Firmware C-more Ea9-t10wcl C-more Ea9-t10wcl Firmware C-more Ea9-t12cl C-more Ea9-t12cl Firmware C-more Ea9-t15cl C-more Ea9-t15cl-r C-more Ea9-t15cl-r Firmware C-more Ea9-t15cl Firmware C-more Ea9-t6cl C-more Ea9-t6cl-r C-more Ea9-t6cl-r Firmware C-more Ea9-t6cl Firmware C-more Ea9-t8cl C-more Ea9-t8cl Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published:

Updated: 2025-02-06T21:25:24.680Z

Reserved: 2024-11-21T20:33:31.495Z

Link: CVE-2024-11611

cve-icon Vulnrichment

Updated: 2025-01-30T20:44:23.153Z

cve-icon NVD

Status : Analyzed

Published: 2025-01-30T21:15:13.450

Modified: 2025-08-12T15:10:32.590

Link: CVE-2024-11611

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses