First published: Wed Feb 26 2025(Updated: )
Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. If a target visits a malicious page or opens a malicious file an attacker can leverage this vulnerability to execute code in the context of the current process.
Credit: 759f5e80-c8e1-4224-bead-956d7b33c98b
Affected Software | Affected Version | How to fix |
---|---|---|
Delta Electronics CNCSoft-G2 |
Delta Electronics recommends users update to CNCSoft-G2 V2.1.0.20 https://downloadcenter.deltaww.com/en-US/DownloadCenter or later.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-22881 has been classified as a critical severity vulnerability due to its potential for remote code execution.
To mitigate CVE-2025-22881, users should apply the latest security updates provided by Delta Electronics for CNCSoft-G2.
CVE-2025-22881 is a heap-based buffer overflow issue resulting from improper validation of user-supplied data.
CVE-2025-22881 affects users of Delta Electronics CNCSoft-G2 software.
If CVE-2025-22881 is exploited, an attacker could execute arbitrary code in the context of the affected application, potentially compromising system security.