Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-24122: n/a

0
Critical
VulnerabilityCVE-2024-24122cvecve-2024-24122
Published: Wed Oct 02 2024 (10/02/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

A remote code execution vulnerability in the project management of Wanxing Technology's Yitu project which allows an attacker to use the exp.adpx file as a zip compressed file to construct a special file name, which can be used to decompress the project file into the system startup folder, restart the system, and automatically execute the constructed attack script.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 09:26:50 UTC

Technical Analysis

CVE-2024-24122 is a critical remote code execution (RCE) vulnerability affecting Wanxing Technology's Yitu project management software. The vulnerability arises from insecure handling of the exp.adpx file, which is processed as a zip compressed archive. An attacker can craft a specially named file within this archive that exploits path traversal weaknesses (CWE-22) to decompress files into the system's startup folder. This allows the malicious payload to execute automatically upon system reboot without requiring any user interaction or authentication. The attack vector involves delivering a malicious exp.adpx file that, when opened by the vulnerable software, triggers the extraction of an attack script into the startup directory. Upon system restart, the script runs with the privileges of the logged-in user or system, enabling full remote code execution. The vulnerability has a CVSS v3.1 base score of 9.8, reflecting its ease of exploitation over the network (AV:N), no required privileges (PR:N), no user interaction (UI:N), and its impact on confidentiality, integrity, and availability (all high). No official patches or updates have been released yet, and no active exploitation has been reported, but the critical nature of the flaw demands immediate attention. The root cause is improper validation and sanitization of file paths during archive extraction, allowing directory traversal and arbitrary file write. This vulnerability can be weaponized for persistent backdoors, ransomware deployment, or full system takeover.

Potential Impact

The impact of CVE-2024-24122 is severe for organizations using Wanxing Technology's Yitu project management software. Successful exploitation leads to complete system compromise, allowing attackers to execute arbitrary code with user or system-level privileges. This can result in data theft, destruction, ransomware attacks, or lateral movement within networks. Since the malicious payload is placed in the system startup folder, the attack persists across reboots, complicating detection and remediation. The vulnerability affects confidentiality by exposing sensitive project management data, integrity by allowing unauthorized modifications, and availability by potentially disabling critical systems. The lack of required authentication and user interaction significantly increases the attack surface, enabling remote attackers to compromise systems without user awareness. Organizations relying on this software for project management, especially in critical infrastructure, government, or enterprises with sensitive intellectual property, face heightened risks of operational disruption and data breaches.

Mitigation Recommendations

To mitigate CVE-2024-24122, organizations should immediately implement the following measures: 1) Restrict network access to systems running the Yitu project management software, limiting exposure to trusted internal networks only. 2) Monitor and block suspicious exp.adpx files or zip archives with unusual file paths using advanced endpoint detection and response (EDR) tools. 3) Employ application whitelisting to prevent unauthorized scripts from executing from startup folders. 4) Regularly audit and harden file system permissions on startup directories to prevent unauthorized file writes. 5) Use sandboxing or virtual machines to open untrusted project files safely. 6) Engage with Wanxing Technology for updates or patches and apply them promptly once available. 7) Implement network intrusion detection systems (NIDS) with signatures targeting this vulnerability’s exploitation patterns. 8) Educate users about the risks of opening unverified project files and enforce strict file handling policies. 9) Maintain comprehensive backups and incident response plans to recover quickly from potential compromises. These targeted actions go beyond generic advice by focusing on controlling the specific attack vector and limiting persistence mechanisms.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-01-25T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d56b7ef31ef0b5707f0

Added to database: 2/25/2026, 9:44:54 PM

Last enriched: 2/28/2026, 9:26:50 AM

Last updated: 4/12/2026, 1:57:38 PM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses