overflow in
Fuji Electric Monitouch V-SFT-6, which may allow the attacker to execute arbitrary code.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
Fuji Electric has addressed these vulnerabilities in their October release (V-SFT V6.2.8.0). They recommend users update to V6.2.9.0 or newer. https://felib.fujielectric.co.jp/en/document_search
Workaround
No workaround given by the vendor.
Tue, 04 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 04 Nov 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A maliciously crafted project file may cause a heap-based buffer overflow in Fuji Electric Monitouch V-SFT-6, which may allow the attacker to execute arbitrary code. | |
| Title | Fuji Electric Monitouch V-SFT-6 Heap-based Buffer Overflow | |
| Weaknesses | CWE-122 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-11-04T21:46:35.254Z
Reserved: 2025-07-30T19:03:10.137Z
Link: CVE-2025-54496
Updated: 2025-11-04T21:46:31.623Z
Status : Received
Published: 2025-11-04T22:16:28.560
Modified: 2025-11-04T22:16:28.560
Link: CVE-2025-54496
No data.
OpenCVE Enrichment
No data.