First published: Fri Feb 07 2025(Updated: )
Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. If a target visits a malicious page or opens a malicious file an attacker can leverage this vulnerability to execute code in the context of the current process.
Affected Software | Affected Version | How to fix |
---|---|---|
Delta Electronics CNCSoft-G2 |
Delta Electronics recommends users update to CNCSoft-G2 V2.1.0.20 https://downloadcenter.deltaww.com/en-US/DownloadCenter or later.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-22880 has been classified as a high severity vulnerability due to its ability to allow remote code execution.
To fix CVE-2025-22880, update to the latest version of Delta Electronics CNCSoft-G2 that includes the necessary security patches.
CVE-2025-22880 affects users of Delta Electronics CNCSoft-G2 software that has not been patched.
CVE-2025-22880 is a heap-based buffer overflow vulnerability resulting from improper validation of user-supplied data.
By exploiting CVE-2025-22880, attackers can execute arbitrary code in the context of the application, potentially compromising system security.