Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-55020: n/a

0
Critical
VulnerabilityCVE-2024-55020cvecve-2024-55020
Published: Tue Mar 03 2026 (03/03/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

A command injection vulnerability in the DHCP activation feature of Weintek cMT-3072XH2 easyweb Web Version v2.1.53, OS v20231011 allows attackers to execute arbitrary commands with root privileges.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/10/2026, 19:45:29 UTC

Technical Analysis

CVE-2024-55020 is a command injection vulnerability identified in the DHCP activation feature of the Weintek cMT-3072XH2 easyweb Web Version v2.1.53 running OS version v20231011. The flaw arises due to insufficient input validation and improper handling of user-supplied data within the DHCP activation process, allowing attackers to inject arbitrary shell commands. This vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command) and CWE-20 (Improper Input Validation). The critical aspect of this vulnerability is that it can be exploited remotely over the network without any authentication or user interaction, granting attackers root-level privileges on the affected device. This level of access enables full control over the device, including the ability to alter configurations, disrupt operations, exfiltrate sensitive data, or use the device as a pivot point for further network compromise. The device in question, Weintek cMT-3072XH2, is commonly used in industrial automation and human-machine interface (HMI) applications, making this vulnerability particularly dangerous in operational technology (OT) environments. The CVSS v3.1 base score of 9.8 reflects the high impact and ease of exploitation. As of the publication date, no patches or official fixes have been released, and there are no known exploits actively used in the wild. This increases the urgency for organizations to implement interim protective measures. The vulnerability's root cause is a failure to properly sanitize inputs passed to system commands during DHCP activation, which attackers can leverage to execute arbitrary commands with root privileges, effectively compromising the device's confidentiality, integrity, and availability.

Potential Impact

The impact of CVE-2024-55020 is severe for organizations utilizing Weintek cMT-3072XH2 devices, especially in industrial and critical infrastructure sectors. Successful exploitation results in complete device compromise with root privileges, allowing attackers to execute arbitrary commands, manipulate device behavior, disrupt industrial processes, or exfiltrate sensitive operational data. This can lead to operational downtime, safety hazards, financial losses, and damage to organizational reputation. Given the device's role in industrial automation, exploitation could also have cascading effects on broader industrial control systems (ICS) networks. The lack of authentication and user interaction requirements significantly increases the risk of automated or widespread attacks. Furthermore, attackers could leverage compromised devices as footholds for lateral movement within enterprise or OT networks, escalating the scope of the breach. The absence of patches means organizations must rely on network-level defenses and configuration changes to mitigate risk, increasing operational complexity and potential exposure until a fix is available.

Mitigation Recommendations

1. Immediately isolate affected Weintek cMT-3072XH2 devices from untrusted networks, especially the internet, to prevent remote exploitation. 2. Disable the DHCP activation feature if it is not essential for device operation, reducing the attack surface. 3. Implement strict network segmentation and firewall rules to restrict access to the device management interfaces only to trusted administrators and systems. 4. Monitor network traffic and device logs for unusual commands or access patterns indicative of exploitation attempts. 5. Employ intrusion detection/prevention systems (IDS/IPS) tailored for industrial protocols to detect anomalous activity. 6. Engage with Weintek or authorized vendors for updates on patches or firmware upgrades addressing this vulnerability. 7. Develop and test incident response plans specific to OT environments to quickly contain and remediate potential compromises. 8. Consider deploying application-layer gateways or proxies that can sanitize or block malicious input targeting the DHCP activation feature. 9. Conduct comprehensive asset inventories to identify all affected devices and prioritize mitigation efforts accordingly. 10. Educate operational staff about the risks and signs of exploitation to enhance early detection capabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-12-06T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a72cf6d1a09e29cb6e2695

Added to database: 3/3/2026, 6:48:22 PM

Last enriched: 3/10/2026, 7:45:29 PM

Last updated: 4/18/2026, 2:44:55 PM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses