CVE-2024-4192

Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
References
Link Resource
https://www.cisa.gov/news-events/ics-advisories/icsa-24-121-01 Third Party Advisory US Government Resource
https://www.cisa.gov/news-events/ics-advisories/icsa-24-121-01 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

cpe:2.3:a:deltaww:cncsoft-g2:*:*:*:*:*:*:*:*

History

10 Jul 2025, 15:54

Type Values Removed Values Added
First Time Deltaww
Deltaww cncsoft-g2
References () https://www.cisa.gov/news-events/ics-advisories/icsa-24-121-01 - () https://www.cisa.gov/news-events/ics-advisories/icsa-24-121-01 - Third Party Advisory, US Government Resource
CPE cpe:2.3:a:deltaww:cncsoft-g2:*:*:*:*:*:*:*:*

Information

Published : 2024-04-30 23:15

Updated : 2025-07-10 15:54


NVD link : CVE-2024-4192

Mitre link : CVE-2024-4192

CVE.ORG link : CVE-2024-4192


JSON object : View

Products Affected

deltaww

  • cncsoft-g2
CWE
CWE-121

Stack-based Buffer Overflow