Delta Electronics DOPSoft is vulnerable to a stack-based buffer overflow, which may allow for arbitrary code execution if an attacker can lead a legitimate user to execute a specially crafted file.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2023-58216 | Delta Electronics DOPSoft is vulnerable to a stack-based buffer overflow, which may allow for arbitrary code execution if an attacker can lead a legitimate user to execute a specially crafted file. |
Fixes
Solution
Delta Electronics has declared DOPSoft as end-of-life and recommends users to use DIAScreen instead. This vulnerability does not exist on the newest version of DIAScreen. Users may download the DIAScreen v1.3.1 (or newer) on the DIAStudio download center https://diastudio.deltaww.com/home/downloads
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-08-02T08:14:25.147Z
Reserved: 2023-11-02T22:30:47.777Z
Link: CVE-2023-5944

No data.

Status : Modified
Published: 2023-12-04T23:15:27.940
Modified: 2024-11-21T08:42:50.003
Link: CVE-2023-5944

No data.

No data.