1. EXECUTIVE SUMMARY
- CVSS v4 9.3
- ATTENTION: Exploitable remotely/low attack complexity
- Vendor: AutomationDirect
- Equipment: C-more EA9 HMI
- Vulnerability: Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’)
2. RISK EVALUATION
Successful exploitation of this vulnerability could allow an attacker to cause a denial-of-service condition or achieve remote code execution on the affected device.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
The following Automation Direct products are affected:
- C-more EA9 HMI EA9-T6CL: v6.79 and prior
- C-more EA9 HMI EA9-T7CL-R: v6.79 and prior
- C-more EA9 HMI EA9-T7CL: v6.79 and prior
- C-more EA9 HMI EA9-T8CL: v6.79 and prior
- C-more EA9 HMI EA9-T10CL: v6.79 and prior
- C-more EA9 HMI EA9-T10WCL: v6.79 and prior
- C-more EA9 HMI EA9-T12CL: v6.79 and prior
- C-more EA9 HMI EA9-T15CL-R: v6.79 and prior
- C-more EA9 HMI EA9-T15CL: v6.79 and prior
- C-more EA9 HMI EA9-RHMI: v6.79 and prior
3.2 VULNERABILITY OVERVIEW
3.2.1 Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’) CWE-120
AutomationDirect C-more EA9 HMI contains a function with bounds checks that can be skipped, which could result in an attacker abusing the function to cause a denial-of-service condition or achieving remote code execution on the affected device.
CVE-2025-0960 has been assigned to this vulnerability. A CVSS v3.1 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
A CVSS v4 score has also been calculated for This article has been indexed from All CISA Advisories