Zurück zur Übersicht

Weidmueller: Multiple vulnerabilities in Energy Meter 750-24 and Energy Meter 750-230

VDE-2025-096
Last update
10.03.2026 08:00
Published at
10.03.2026 08:00
Vendor(s)
Weidmueller Interface GmbH & Co. KG
External ID
VDE-2025-096
CSAF Document

Summary

An unauthenticated remote attacker can exploit several vulnerabilities in Weidmueller devices Energy Meter 750-24 and Energy Meter 750-230 to ultimately gain full system access and remote code execution.

Impact

These vulnerabilities in combination allow an unauthenticated remote attacker to fully compromise the system including remote code execution. Further details on each separate vulnerability can be found under vulnerability details.

Affected Product(s)

Model no. Product name Affected versions
2540910000 ENERGY METER 750-230 Firmware 3.13, Firmware <=3.13
2540900000 ENERGY METER 750-24 Firmware <=3.13, Firmware 3.13

Vulnerabilities

Expand / Collapse all

Published
10.03.2026 08:24
Weakness
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78)
Summary

An unauthenticated remote attacker can perform a command injection via Modbus-TCP or Modbus-RTU to gain read and write access on the affected device.

References

Published
10.03.2026 08:24
Weakness
Incorrect Permission Assignment for Critical Resource (CWE-732)
Summary

An unauthenticated remote attacker who tricks a user to upload a manipulated HTML file can get access to sensitive information on the device. This is a result of incorrect permission assignment for the web server.

References

Published
10.03.2026 08:24
Weakness
Use of Hard-coded Credentials (CWE-798)
Summary

An unauthenticated remote attacker may use hardcodes credentials to get access to the previously activated FTP Server with limited read and write privileges.

References

Published
10.03.2026 08:24
Weakness
Use of a Broken or Risky Cryptographic Algorithm (CWE-327)
Summary

An unauthenticated remote attacker can use firmware images to extract password hashes and brute force plaintext passwords of accounts with limited access.

References

Remediation

It is strongly advised to update to the newest version. The vulnerabilities are fixed in version 3.14.

Acknowledgments

Weidmueller Interface GmbH & Co. KG thanks the following parties for their efforts:

Revision History

Version Date Summary
1.0.0 10.03.2026 08:00 Initial version