CVE-2024-11609

AutomationDirect C-More EA9 EAP9 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of AutomationDirect C-More EA9. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of EAP9 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24772.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:automationdirect:c-more_ea9-t10cl_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:automationdirect:c-more_ea9-t10cl:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:automationdirect:c-more_ea9-t10wcl_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:automationdirect:c-more_ea9-t10wcl:*:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:automationdirect:c-more_ea9-t12cl_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:automationdirect:c-more_ea9-t12cl:*:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:automationdirect:c-more_ea9-t15cl_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:automationdirect:c-more_ea9-t15cl:*:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:automationdirect:c-more_ea9-t15cl-r_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:automationdirect:c-more_ea9-t15cl-r:*:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:automationdirect:c-more_ea9-t6cl_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:automationdirect:c-more_ea9-t6cl:*:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:automationdirect:c-more_ea9-t6cl-r_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:automationdirect:c-more_ea9-t6cl-r:*:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:automationdirect:c-more_ea9-t8cl_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:automationdirect:c-more_ea9-t8cl:*:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:automationdirect:c-more_ea9-rhmi_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:automationdirect:c-more_ea9-rhmi:-:*:*:*:*:*:*:*

History

12 Aug 2025, 15:10

Type Values Removed Values Added
CPE cpe:2.3:o:automationdirect:c-more_ea9-t12cl_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:automationdirect:c-more_ea9-t8cl:*:*:*:*:*:*:*:*
cpe:2.3:o:automationdirect:c-more_ea9-rhmi_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:automationdirect:c-more_ea9-t12cl:*:*:*:*:*:*:*:*
cpe:2.3:h:automationdirect:c-more_ea9-rhmi:-:*:*:*:*:*:*:*
cpe:2.3:h:automationdirect:c-more_ea9-t6cl-r:*:*:*:*:*:*:*:*
cpe:2.3:h:automationdirect:c-more_ea9-t6cl:*:*:*:*:*:*:*:*
cpe:2.3:o:automationdirect:c-more_ea9-t15cl-r_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:automationdirect:c-more_ea9-t10wcl:*:*:*:*:*:*:*:*
cpe:2.3:o:automationdirect:c-more_ea9-t10cl_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:automationdirect:c-more_ea9-t10cl:*:*:*:*:*:*:*:*
cpe:2.3:o:automationdirect:c-more_ea9-t8cl_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:automationdirect:c-more_ea9-t10wcl_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:automationdirect:c-more_ea9-t15cl_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:automationdirect:c-more_ea9-t15cl-r:*:*:*:*:*:*:*:*
cpe:2.3:h:automationdirect:c-more_ea9-t15cl:*:*:*:*:*:*:*:*
cpe:2.3:o:automationdirect:c-more_ea9-t6cl-r_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:automationdirect:c-more_ea9-t6cl_firmware:*:*:*:*:*:*:*:*
References () https://www.zerodayinitiative.com/advisories/ZDI-24-1673/ - () https://www.zerodayinitiative.com/advisories/ZDI-24-1673/ - Third Party Advisory
References () https://certvde.com/en/bulletins/bulletins/2182-automationdirect-c-more-ea9-programming-software/ - () https://certvde.com/en/bulletins/bulletins/2182-automationdirect-c-more-ea9-programming-software/ - Third Party Advisory
First Time Automationdirect c-more Ea9-t6cl
Automationdirect
Automationdirect c-more Ea9-t10cl Firmware
Automationdirect c-more Ea9-t6cl Firmware
Automationdirect c-more Ea9-t15cl
Automationdirect c-more Ea9-t15cl-r Firmware
Automationdirect c-more Ea9-t15cl Firmware
Automationdirect c-more Ea9-rhmi
Automationdirect c-more Ea9-t10cl
Automationdirect c-more Ea9-t6cl-r
Automationdirect c-more Ea9-t10wcl
Automationdirect c-more Ea9-t12cl
Automationdirect c-more Ea9-t15cl-r
Automationdirect c-more Ea9-t6cl-r Firmware
Automationdirect c-more Ea9-t10wcl Firmware
Automationdirect c-more Ea9-t8cl Firmware
Automationdirect c-more Ea9-t12cl Firmware
Automationdirect c-more Ea9-rhmi Firmware
Automationdirect c-more Ea9-t8cl

30 Jan 2025, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-30 21:15

Updated : 2025-08-12 15:10


NVD link : CVE-2024-11609

Mitre link : CVE-2024-11609


JSON object : View

Products Affected

automationdirect

  • c-more_ea9-rhmi
  • c-more_ea9-t8cl
  • c-more_ea9-t15cl_firmware
  • c-more_ea9-t6cl-r_firmware
  • c-more_ea9-t10cl
  • c-more_ea9-rhmi_firmware
  • c-more_ea9-t10wcl_firmware
  • c-more_ea9-t15cl-r
  • c-more_ea9-t10cl_firmware
  • c-more_ea9-t8cl_firmware
  • c-more_ea9-t6cl
  • c-more_ea9-t6cl_firmware
  • c-more_ea9-t12cl_firmware
  • c-more_ea9-t15cl
  • c-more_ea9-t12cl
  • c-more_ea9-t15cl-r_firmware
  • c-more_ea9-t6cl-r
  • c-more_ea9-t10wcl
CWE
CWE-121

Stack-based Buffer Overflow