An authenticated remote attacker with high privileges can exploit the OpenVPN configuration via the web-based management interface of a WAGO PLC. If user-defined scripts are permitted, OpenVPN may allow the execution of arbitrary shell commands enabling the attacker to run arbitrary commands on the device.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 09 Apr 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An authenticated remote attacker with high privileges can exploit the OpenVPN configuration via the web-based management interface of a WAGO PLC. If user-defined scripts are permitted, OpenVPN may allow the execution of arbitrary shell commands enabling the attacker to run arbitrary commands on the device. | |
| Title | Wago: Vulnerability in WBM through Open VPN | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2026-04-09T10:52:41.174Z
Reserved: 2024-02-14T15:20:27.403Z
Link: CVE-2024-1490
No data.
Status : Received
Published: 2026-04-09T11:16:19.657
Modified: 2026-04-09T11:16:19.657
Link: CVE-2024-1490
No data.
OpenCVE Enrichment
No data.
Weaknesses