CVE-2024-24122: n/a
A remote code execution vulnerability in the project management of Wanxing Technology's Yitu project which allows an attacker to use the exp.adpx file as a zip compressed file to construct a special file name, which can be used to decompress the project file into the system startup folder, restart the system, and automatically execute the constructed attack script.
AI Analysis
Technical Summary
CVE-2024-24122 is a critical remote code execution (RCE) vulnerability affecting Wanxing Technology's Yitu project management software. The vulnerability arises from insecure handling of the exp.adpx file, which is processed as a zip compressed archive. An attacker can craft a specially named file within this archive that exploits path traversal weaknesses (CWE-22) to decompress files into the system's startup folder. This allows the malicious payload to execute automatically upon system reboot without requiring any user interaction or authentication. The attack vector involves delivering a malicious exp.adpx file that, when opened by the vulnerable software, triggers the extraction of an attack script into the startup directory. Upon system restart, the script runs with the privileges of the logged-in user or system, enabling full remote code execution. The vulnerability has a CVSS v3.1 base score of 9.8, reflecting its ease of exploitation over the network (AV:N), no required privileges (PR:N), no user interaction (UI:N), and its impact on confidentiality, integrity, and availability (all high). No official patches or updates have been released yet, and no active exploitation has been reported, but the critical nature of the flaw demands immediate attention. The root cause is improper validation and sanitization of file paths during archive extraction, allowing directory traversal and arbitrary file write. This vulnerability can be weaponized for persistent backdoors, ransomware deployment, or full system takeover.
Potential Impact
The impact of CVE-2024-24122 is severe for organizations using Wanxing Technology's Yitu project management software. Successful exploitation leads to complete system compromise, allowing attackers to execute arbitrary code with user or system-level privileges. This can result in data theft, destruction, ransomware attacks, or lateral movement within networks. Since the malicious payload is placed in the system startup folder, the attack persists across reboots, complicating detection and remediation. The vulnerability affects confidentiality by exposing sensitive project management data, integrity by allowing unauthorized modifications, and availability by potentially disabling critical systems. The lack of required authentication and user interaction significantly increases the attack surface, enabling remote attackers to compromise systems without user awareness. Organizations relying on this software for project management, especially in critical infrastructure, government, or enterprises with sensitive intellectual property, face heightened risks of operational disruption and data breaches.
Mitigation Recommendations
To mitigate CVE-2024-24122, organizations should immediately implement the following measures: 1) Restrict network access to systems running the Yitu project management software, limiting exposure to trusted internal networks only. 2) Monitor and block suspicious exp.adpx files or zip archives with unusual file paths using advanced endpoint detection and response (EDR) tools. 3) Employ application whitelisting to prevent unauthorized scripts from executing from startup folders. 4) Regularly audit and harden file system permissions on startup directories to prevent unauthorized file writes. 5) Use sandboxing or virtual machines to open untrusted project files safely. 6) Engage with Wanxing Technology for updates or patches and apply them promptly once available. 7) Implement network intrusion detection systems (NIDS) with signatures targeting this vulnerability’s exploitation patterns. 8) Educate users about the risks of opening unverified project files and enforce strict file handling policies. 9) Maintain comprehensive backups and incident response plans to recover quickly from potential compromises. These targeted actions go beyond generic advice by focusing on controlling the specific attack vector and limiting persistence mechanisms.
Affected Countries
China, United States, India, Russia, South Korea, Japan, Germany, United Kingdom, Australia, Singapore
CVE-2024-24122: n/a
Description
A remote code execution vulnerability in the project management of Wanxing Technology's Yitu project which allows an attacker to use the exp.adpx file as a zip compressed file to construct a special file name, which can be used to decompress the project file into the system startup folder, restart the system, and automatically execute the constructed attack script.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-24122 is a critical remote code execution (RCE) vulnerability affecting Wanxing Technology's Yitu project management software. The vulnerability arises from insecure handling of the exp.adpx file, which is processed as a zip compressed archive. An attacker can craft a specially named file within this archive that exploits path traversal weaknesses (CWE-22) to decompress files into the system's startup folder. This allows the malicious payload to execute automatically upon system reboot without requiring any user interaction or authentication. The attack vector involves delivering a malicious exp.adpx file that, when opened by the vulnerable software, triggers the extraction of an attack script into the startup directory. Upon system restart, the script runs with the privileges of the logged-in user or system, enabling full remote code execution. The vulnerability has a CVSS v3.1 base score of 9.8, reflecting its ease of exploitation over the network (AV:N), no required privileges (PR:N), no user interaction (UI:N), and its impact on confidentiality, integrity, and availability (all high). No official patches or updates have been released yet, and no active exploitation has been reported, but the critical nature of the flaw demands immediate attention. The root cause is improper validation and sanitization of file paths during archive extraction, allowing directory traversal and arbitrary file write. This vulnerability can be weaponized for persistent backdoors, ransomware deployment, or full system takeover.
Potential Impact
The impact of CVE-2024-24122 is severe for organizations using Wanxing Technology's Yitu project management software. Successful exploitation leads to complete system compromise, allowing attackers to execute arbitrary code with user or system-level privileges. This can result in data theft, destruction, ransomware attacks, or lateral movement within networks. Since the malicious payload is placed in the system startup folder, the attack persists across reboots, complicating detection and remediation. The vulnerability affects confidentiality by exposing sensitive project management data, integrity by allowing unauthorized modifications, and availability by potentially disabling critical systems. The lack of required authentication and user interaction significantly increases the attack surface, enabling remote attackers to compromise systems without user awareness. Organizations relying on this software for project management, especially in critical infrastructure, government, or enterprises with sensitive intellectual property, face heightened risks of operational disruption and data breaches.
Mitigation Recommendations
To mitigate CVE-2024-24122, organizations should immediately implement the following measures: 1) Restrict network access to systems running the Yitu project management software, limiting exposure to trusted internal networks only. 2) Monitor and block suspicious exp.adpx files or zip archives with unusual file paths using advanced endpoint detection and response (EDR) tools. 3) Employ application whitelisting to prevent unauthorized scripts from executing from startup folders. 4) Regularly audit and harden file system permissions on startup directories to prevent unauthorized file writes. 5) Use sandboxing or virtual machines to open untrusted project files safely. 6) Engage with Wanxing Technology for updates or patches and apply them promptly once available. 7) Implement network intrusion detection systems (NIDS) with signatures targeting this vulnerability’s exploitation patterns. 8) Educate users about the risks of opening unverified project files and enforce strict file handling policies. 9) Maintain comprehensive backups and incident response plans to recover quickly from potential compromises. These targeted actions go beyond generic advice by focusing on controlling the specific attack vector and limiting persistence mechanisms.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-01-25T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6d56b7ef31ef0b5707f0
Added to database: 2/25/2026, 9:44:54 PM
Last enriched: 2/28/2026, 9:26:50 AM
Last updated: 4/12/2026, 1:57:38 PM
Views: 20
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.