Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.cisa.gov/news-events/ics-advisories/icsa-24-121-01 | Third Party Advisory US Government Resource | 
| https://www.cisa.gov/news-events/ics-advisories/icsa-24-121-01 | Third Party Advisory US Government Resource | 
Configurations
                    History
                    10 Jul 2025, 15:54
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | 
        
        Deltaww cncsoft-g2
         Deltaww  | 
|
| CPE | cpe:2.3:a:deltaww:cncsoft-g2:*:*:*:*:*:*:*:* | |
| References | () https://www.cisa.gov/news-events/ics-advisories/icsa-24-121-01 - Third Party Advisory, US Government Resource | 
21 Nov 2024, 09:42
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
        
        
  | 
|
| References | () https://www.cisa.gov/news-events/ics-advisories/icsa-24-121-01 - | 
30 Apr 2024, 23:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-04-30 23:15
Updated : 2025-07-10 15:54
NVD link : CVE-2024-4192
Mitre link : CVE-2024-4192
CVE.ORG link : CVE-2024-4192
JSON object : View
Products Affected
                deltaww
- cncsoft-g2
 
CWE
                
                    
                        
                        CWE-121
                        
            Stack-based Buffer Overflow
