AutomationDirect C-MORE EA9 HMI
Multiple C-MORE EA9 HMI models and software variants are vulnerable to remote code injection through buffer overflow, path traversal, and credential hardcoding vulnerabilities (CWE-22, CWE-121, CWE-256). An attacker with network access can inject and execute malicious code on the HMI without authentication, potentially compromising the operator interface and enabling manipulation of monitored processes. Affected versions are 6.77 and earlier across all C-MORE EA9 hardware models (EA9-T6CL, EA9-T7CL, EA9-T8CL, EA9-T10CL, EA9-T10WCL, EA9-T12CL, EA9-T15CL, EA9-RHMI, EA9-PGMSW) and the industrial remote HMI variant (EA0-T7CL-R).
- Network access to the C-MORE EA9 HMI device (typically port 502 for Modbus/TCP or port 44818 for EtherNet/IP)
- No authentication required for exploitation
- HMI firmware version 6.77 or earlier
Patching may require device reboot — plan for process interruption
/api/v1/advisories/08304ee2-763b-4ede-995d-d4f4492b0f50Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.