CVE-2024-4192

Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
References
Link Resource
https://www.cisa.gov/news-events/ics-advisories/icsa-24-121-01 Third Party Advisory US Government Resource
https://www.cisa.gov/news-events/ics-advisories/icsa-24-121-01 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

cpe:2.3:a:deltaww:cncsoft-g2:*:*:*:*:*:*:*:*

History

10 Jul 2025, 15:54

Type Values Removed Values Added
First Time Deltaww cncsoft-g2
Deltaww
References () https://www.cisa.gov/news-events/ics-advisories/icsa-24-121-01 - () https://www.cisa.gov/news-events/ics-advisories/icsa-24-121-01 - Third Party Advisory, US Government Resource
CPE cpe:2.3:a:deltaww:cncsoft-g2:*:*:*:*:*:*:*:*

21 Nov 2024, 09:42

Type Values Removed Values Added
Summary
  • (es) Delta Electronics CNCSoft-G2 carece de una validación adecuada de la longitud de los datos proporcionados por el usuario antes de copiarlos en un búfer basado en pila de longitud fija. Un atacante puede aprovechar esta vulnerabilidad para ejecutar código en el contexto del proceso actual.
References () https://www.cisa.gov/news-events/ics-advisories/icsa-24-121-01 - () https://www.cisa.gov/news-events/ics-advisories/icsa-24-121-01 -

01 May 2024, 13:02

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-30 23:15

Updated : 2025-07-10 15:54


NVD link : CVE-2024-4192

Mitre link : CVE-2024-4192

CVE.ORG link : CVE-2024-4192


JSON object : View

Products Affected

deltaww

  • cncsoft-g2
CWE
CWE-121

Stack-based Buffer Overflow