CVE-2023-50466

8.8 HIGH

📋 TL;DR

This CVE describes an authenticated command injection vulnerability in Weintek cMT2078X HMI devices running easyWeb v2.1.3 and OS v20220215. Attackers with valid credentials can inject malicious payloads into the HMI Name parameter to execute arbitrary code or access sensitive information. Organizations using these specific Weintek HMI devices are affected.

💻 Affected Systems

Products:
  • Weintek cMT2078X
Versions: easyWeb Web Version v2.1.3, OS v20220215
Operating Systems: Weintek OS v20220215
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the web interface. The vulnerability exists in the HMI Name parameter handling.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to execute arbitrary commands with system privileges, potentially leading to industrial process disruption, data theft, or lateral movement into OT networks.

🟠

Likely Case

Unauthorized command execution leading to data exfiltration, configuration changes, or denial of service affecting HMI functionality.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent exploitation attempts from reaching vulnerable systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid credentials but is straightforward once authenticated. The vulnerability is well-documented in public reports.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

Check Weintek's official website or contact vendor support for security updates. No official patch information is currently available in public sources.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Weintek HMI devices from untrusted networks and restrict access to authorized personnel only.

Access Control Hardening

all

Implement strong authentication mechanisms, change default credentials, and limit administrative access to necessary personnel.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected devices from internet and untrusted networks
  • Deploy web application firewalls (WAF) with command injection detection rules in front of HMI interfaces

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface or device settings. If running easyWeb v2.1.3 with OS v20220215, the device is vulnerable.

Check Version:

Access device web interface and navigate to system information or settings page to view firmware versions.

Verify Fix Applied:

Verify firmware has been updated to a version beyond the affected releases. Check vendor advisories for specific patched versions.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns in system logs
  • Multiple failed authentication attempts followed by successful login and parameter manipulation
  • Unexpected system process creation

Network Indicators:

  • Unusual HTTP POST requests to HMI Name parameter endpoints
  • Command injection patterns in web traffic to HMI interfaces
  • Unexpected outbound connections from HMI devices

SIEM Query:

source="weintek_hmi" AND (http_method="POST" AND uri_path="/hmi_name" AND (content="|" OR content="$" OR content="`"))

🔗 References

📤 Share & Export