An authenticated remote attacker with high privileges can exploit the OpenVPN configuration via the web-based management interface of a WAGO PLC. If user-defined scripts are permitted, OpenVPN may allow the execution of arbitrary shell commands enabling the attacker to run arbitrary commands on the device.

Project Subscriptions

Vendors Products
Cc100 (0751-9x01) Subscribe
Edge Controller (0752-8303-8000-0002) Subscribe
Pfc100 G1 (0750-810-xxxx-xxxx) Subscribe
Pfc100 G2 (0750-811x-xxxx-xxxx) Subscribe
Pfc200 G1 (750-820x-xxxx-xxxx) Subscribe
Pfc200 G2 (750-821x-xxxx-xxxx) Subscribe
Tp600 (0762-420x-8000-000x) Subscribe
Tp600 (0762-430x-8000-000x) Subscribe
Tp600 (0762-520x-8000-000x) Subscribe
Tp600 (0762-530x-8000-000x) Subscribe
Tp600 (0762-620x-8000-000x) Subscribe
Tp600 (0762-630x-8000-000x) Subscribe
Wp400 (0762-340x) Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Wago
Wago cc100 (0751-9x01)
Wago edge Controller (0752-8303-8000-0002)
Wago pfc100 G1 (0750-810-xxxx-xxxx)
Wago pfc100 G2 (0750-811x-xxxx-xxxx)
Wago pfc200 G1 (750-820x-xxxx-xxxx)
Wago pfc200 G2 (750-821x-xxxx-xxxx)
Wago tp600 (0762-420x-8000-000x)
Wago tp600 (0762-430x-8000-000x)
Wago tp600 (0762-520x-8000-000x)
Wago tp600 (0762-530x-8000-000x)
Wago tp600 (0762-620x-8000-000x)
Wago tp600 (0762-630x-8000-000x)
Wago wp400 (0762-340x)
Vendors & Products Wago
Wago cc100 (0751-9x01)
Wago edge Controller (0752-8303-8000-0002)
Wago pfc100 G1 (0750-810-xxxx-xxxx)
Wago pfc100 G2 (0750-811x-xxxx-xxxx)
Wago pfc200 G1 (750-820x-xxxx-xxxx)
Wago pfc200 G2 (750-821x-xxxx-xxxx)
Wago tp600 (0762-420x-8000-000x)
Wago tp600 (0762-430x-8000-000x)
Wago tp600 (0762-520x-8000-000x)
Wago tp600 (0762-530x-8000-000x)
Wago tp600 (0762-620x-8000-000x)
Wago tp600 (0762-630x-8000-000x)
Wago wp400 (0762-340x)

Thu, 09 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 09 Apr 2026 11:15:00 +0000

Type Values Removed Values Added
Description An authenticated remote attacker with high privileges can exploit the OpenVPN configuration via the web-based management interface of a WAGO PLC. If user-defined scripts are permitted, OpenVPN may allow the execution of arbitrary shell commands enabling the attacker to run arbitrary commands on the device.
Title Wago: Vulnerability in WBM through Open VPN
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2026-04-09T16:15:38.524Z

Reserved: 2024-02-14T15:20:27.403Z

Link: CVE-2024-1490

cve-icon Vulnrichment

Updated: 2026-04-09T14:27:42.643Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-09T11:16:19.657

Modified: 2026-04-13T15:02:47.353

Link: CVE-2024-1490

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:32:54Z

Weaknesses