VYPR
High severity7.2NVD Advisory· Published Apr 9, 2026· Updated Apr 13, 2026

CVE-2024-1490

CVE-2024-1490

Description

An authenticated remote attacker with high privileges can exploit the OpenVPN configuration via the web-based management interface of a WAGO PLC. If user-defined scripts are permitted, OpenVPN may allow the execution of arbitrary shell commands enabling the attacker to run arbitrary commands on the device.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An authenticated high-privilege attacker can execute arbitrary shell commands on a WAGO PLC via its web-based management interface when OpenVPN is enabled.

Vulnerability

Description

The vulnerability resides in the Web-Based Management (WBM) function of WAGO PLCs when OpenVPN is enabled [1]. An authenticated attacker with high privileges can exploit the OpenVPN configuration to execute arbitrary shell commands [1]. The root cause involves user-defined scripts being permitted within the OpenVPN configuration, allowing command injection that bypasses intended restrictions.

Attack

Vector

Exploitation requires an attacker to be authenticated to the web-based management interface with high privileges, such as administrative access [1]. The attack is performed remotely over the network, targeting the WBM function while OpenVPN is active. No additional user interaction is needed beyond the initial authentication and configuration manipulation.

Impact

Successful exploitation allows the attacker to run arbitrary shell commands on the affected device [1]. This can lead to full system compromise, including data exfiltration, installation of persistent malware, or disruption of the PLC's control functions. The severity is rated High with a CVSS v3 score of 7.2.

Mitigation

The vendor, WAGO GmbH & Co. KG, has released an advisory (VDE-2024-008) detailing the vulnerability [1]. Users should apply the recommended firmware updates or configuration changes to disable user-defined OpenVPN scripts if not required. At the time of publication, no public exploit code has been reported.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.