Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14750: CWE-472 External Control of Assumed-Immutable Web Parameter in Weintek cMT3072XH

0
High
VulnerabilityCVE-2025-14750cvecve-2025-14750cwe-472
Published: Thu Jan 22 2026 (01/22/2026, 21:40:56 UTC)
Source: CVE Database V5
Vendor/Project: Weintek
Product: cMT3072XH

Description

The web application does not sufficiently verify inputs that are assumed to be immutable but are actually externally controllable. A low-privileged user can modify the parameters and potentially manipulate account-level privileges.

AI-Powered Analysis

AILast updated: 01/30/2026, 09:40:05 UTC

Technical Analysis

CVE-2025-14750 is a vulnerability identified in the Weintek cMT3072XH, an industrial human-machine interface (HMI) device widely used in automation environments. The core issue involves the web application failing to properly verify parameters that are assumed to be immutable; however, these parameters can be externally manipulated by a low-privileged user. This lack of input validation allows an attacker to modify parameters that control account-level privileges, effectively enabling privilege escalation without requiring authentication or user interaction. The vulnerability is categorized under CWE-472, which concerns external control of assumed-immutable web parameters. The CVSS 4.0 base score of 8.7 reflects the vulnerability's high impact, with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The vulnerability affects version 20200630 of the product and is currently published but without known exploits in the wild. The flaw can lead to unauthorized access, modification of user privileges, and potentially full compromise of the device’s control functions, impacting the confidentiality, integrity, and availability of the industrial control system. Given the critical role of HMIs in industrial environments, exploitation could disrupt operational processes or enable further attacks on connected systems.

Potential Impact

For European organizations, especially those in industrial automation, manufacturing, and critical infrastructure sectors, this vulnerability poses a significant risk. Exploitation could allow attackers to escalate privileges on Weintek cMT3072XH devices, leading to unauthorized control over industrial processes. This can result in operational downtime, safety hazards, data breaches, and potential sabotage. The confidentiality of sensitive operational data may be compromised, integrity of control commands altered, and availability of the HMI device disrupted. Given the device’s role in supervisory control, an attacker could pivot to other network segments, amplifying the impact. The risk is heightened in environments where these devices are accessible over corporate or external networks without adequate segmentation or access controls. European industries with extensive use of Weintek products, such as automotive manufacturing in Germany or energy utilities in France and Italy, could face operational and reputational damage if targeted.

Mitigation Recommendations

1. Immediately restrict network access to the Weintek cMT3072XH web interface using firewalls and network segmentation to limit exposure to trusted management networks only. 2. Implement strict access control policies and monitor logs for unusual parameter changes or privilege escalations. 3. Disable or restrict web interface access where possible, especially from untrusted networks. 4. Apply vendor patches or firmware updates as soon as they become available to address the vulnerability. 5. Conduct regular security assessments and penetration testing focused on industrial control systems to detect similar input validation issues. 6. Employ intrusion detection systems tailored for industrial protocols to identify anomalous behavior. 7. Train operational technology (OT) personnel on secure configuration and monitoring of HMI devices. 8. Use multi-factor authentication and strong password policies for device access to reduce risk of unauthorized control. 9. Maintain an inventory of all Weintek devices and ensure they are included in vulnerability management programs. 10. Collaborate with vendors and ICS security communities to stay informed about emerging threats and mitigation strategies.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2025-12-15T20:40:03.048Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69729bc34623b1157c91e037

Added to database: 1/22/2026, 9:50:59 PM

Last enriched: 1/30/2026, 9:40:05 AM

Last updated: 2/7/2026, 5:55:46 PM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats