The Weintek cMT product line is vulnerable to code injection, which may allow an unauthenticated remote attacker to execute commands with root privileges on the operation system.
An issue in the reset_pj.cgi endpoint of Weintek cMT-3072XH2 easyweb v2.1.53, OS v20231011 allows unauthorized attackers to execute arbitrary commands via supplying a crafted GET request.
An authentication bypass vulnerability in the authorization mechanism of Weintek cMT-3072XH2 easyweb v2.1.53, OS v20231011 allows unauthorized attackers to perform Administrative actions using service accounts.
A command injection vulnerability in the DHCP activation feature of Weintek cMT-3072XH2 easyweb Web Version v2.1.53, OS v20231011 allows attackers to execute arbitrary commands with root privileges.
Weintek EasyBuilder Pro contains a vulnerability that, even when the private key is immediately deleted after the crash report transmission is finished, the private key is exposed to the public, which could result in obtaining remote control of the crash report server.
In Weintek's cMT3000 HMI Web CGI device, the cgi-bin command_wb.cgi contains a stack-based buffer overflow, which could allow an anonymous attacker to hijack control flow and bypass login authentication.
The Weintek cMT product line is vulnerable to various improper access controls, which may allow an unauthenticated attacker to remotely access and download sensitive information and perform administrative actions on behalf of a legitimate administrator.
The Weintek cMT product line is vulnerable to a cross-site scripting vulnerability, which could allow an unauthenticated remote attacker to inject malicious JavaScript code.
The listed versions for Weintek EasyBuilder Pro are vulnerable to a ZipSlip attack caused by decompiling a malicious project file. This may allow an attacker to gain control of the user’s computer or gain access to sensitive data.
| CVE ID ⇅ | Severity ↓ | Description | |
|---|---|---|---|
| CVE-2021-27446 | CRITICAL | The Weintek cMT product line is vulnerable to code injection, which may allow an unauthenticated rem… | › |
| CVE-2024-55026 | CRITICAL | An issue in the reset_pj.cgi endpoint of Weintek cMT-3072XH2 easyweb v2.1.53, OS v20231011 allows un… | › |
| CVE-2024-55024 | CRITICAL | An authentication bypass vulnerability in the authorization mechanism of Weintek cMT-3072XH2 easyweb… | › |
| CVE-2024-55020 | CRITICAL | A command injection vulnerability in the DHCP activation feature of Weintek cMT-3072XH2 easyweb Web … | › |
| CVE-2023-5777 | CRITICAL | Weintek EasyBuilder Pro contains a vulnerability that, even when the private key is immediately d… | › |
| CVE-2023-38584 | CRITICAL | In Weintek's cMT3000 HMI Web CGI device, the cgi-bin command_wb.cgi contains a stack-based bu… | › |
| CVE-2021-27444 | CRITICAL | The Weintek cMT product line is vulnerable to various improper access controls, which may allow an u… | › |
| CVE-2021-27442 | CRITICAL | The Weintek cMT product line is vulnerable to a cross-site scripting vulnerability, which could allo… | › |
| CVE-2023-0104 | CRITICAL | The listed versions for Weintek EasyBuilder Pro are vulnerable to a ZipSlip attack caused by decomp… | › |