The web application does not sufficiently verify inputs that are assumed to be immutable but are actually externally controllable. A low-privileged user can modify the parameters and potentially manipulate account-level privileges.
Advisories

No advisories yet.

Fixes

Solution

Weintek recommends users implement the following mitigation techniques: * cMT3072XH: Version 20241112 * cMT3072XH(T): Version 20241112 * cMT-SVRX-820: Version 20240919 * cMT-CTRL01: Version 20250827 For more information, see Weintek's planned notice: https://dl.weintek.com/public/Document/TEC/TEC25003E_cMT_EasyWeb_V2_Security_Issues.pdf


Workaround

No workaround given by the vendor.

History

Fri, 23 Jan 2026 08:00:00 +0900

Type Values Removed Values Added
Description The web application does not sufficiently verify inputs that are assumed to be immutable but are actually externally controllable. A low-privileged user can modify the parameters and potentially manipulate account-level privileges.
Title External Control of Assumed-Immutable Web Parameter in Weintek cMT X Series HMI EasyWeb Service
Weaknesses CWE-472
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2026-01-22T21:40:56.977Z

Reserved: 2025-12-15T20:40:03.048Z

Link: CVE-2025-14750

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-01-22T22:16:14.803

Modified: 2026-01-22T22:16:14.803

Link: CVE-2025-14750

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses