Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-55020: n/a

0
Critical
VulnerabilityCVE-2024-55020cvecve-2024-55020
Published: Tue Mar 03 2026 (03/03/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

A command injection vulnerability in the DHCP activation feature of Weintek cMT-3072XH2 easyweb Web Version v2.1.53, OS v20231011 allows attackers to execute arbitrary commands with root privileges.

AI-Powered Analysis

AILast updated: 03/03/2026, 19:03:57 UTC

Technical Analysis

CVE-2024-55020 is a critical command injection vulnerability affecting the DHCP activation feature in the Weintek cMT-3072XH2 easyweb Web Version v2.1.53 running OS version 20231011. The vulnerability allows an unauthenticated attacker to inject and execute arbitrary commands with root privileges on the device. This is due to improper input validation or sanitization in the DHCP activation component, which processes network configuration commands. Successful exploitation could lead to full system compromise, enabling attackers to manipulate industrial control processes, disrupt operations, or use the device as a foothold for lateral movement within a network. The affected device is a widely used industrial HMI, which interfaces with critical manufacturing and automation systems. No patches or mitigations are currently listed, and no known exploits have been detected in the wild, but the potential impact is severe. The lack of authentication requirements and root-level command execution capability make this vulnerability highly exploitable and dangerous. The vulnerability was reserved in December 2024 and published in March 2026, but the absence of a CVSS score necessitates an independent severity assessment.

Potential Impact

The impact of CVE-2024-55020 is substantial for organizations relying on Weintek cMT-3072XH2 devices in industrial environments. An attacker exploiting this vulnerability can gain root access, allowing complete control over the device and potentially the connected industrial control systems. This can lead to operational disruption, safety hazards, data theft, or sabotage of manufacturing processes. The ability to execute arbitrary commands at the root level means attackers can install persistent malware, disable security controls, or pivot to other network segments. Given the device’s role in critical infrastructure, such as manufacturing plants, energy facilities, or utilities, the threat extends beyond IT systems to physical processes, increasing the risk of significant economic and safety consequences. The lack of authentication and ease of exploitation further elevate the risk, making it a prime target for threat actors aiming to disrupt industrial operations or conduct espionage.

Mitigation Recommendations

To mitigate CVE-2024-55020, organizations should immediately restrict network access to the Weintek cMT-3072XH2 device’s web interface, ideally isolating it within a segmented and monitored network zone. Employ strict firewall rules and VPN access controls to limit exposure. Monitor network traffic for unusual DHCP activation requests or command injection patterns. Disable the DHCP activation feature if it is not essential for operations. Engage with Weintek or authorized vendors to obtain patches or firmware updates addressing this vulnerability as soon as they become available. Implement intrusion detection systems tailored to industrial protocols to detect exploitation attempts. Conduct regular security audits and vulnerability assessments on industrial control devices. Additionally, maintain robust backup and recovery procedures to minimize downtime in case of compromise. Educate operational technology (OT) staff about the risks and signs of exploitation to enhance incident response readiness.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-12-06T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a72cf6d1a09e29cb6e2695

Added to database: 3/3/2026, 6:48:22 PM

Last enriched: 3/3/2026, 7:03:57 PM

Last updated: 3/4/2026, 5:54:32 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses