Fuji Electric Monitouch V-SFT-6 is vulnerable to a stack-based buffer
overflow while processing a specially crafted project file, which may
allow an attacker to execute arbitrary code.
Advisories

No advisories yet.

Fixes

Solution

Fuji Electric has addressed these vulnerabilities in their October release (V-SFT V6.2.8.0). They recommend users update to V6.2.9.0 or newer. https://felib.fujielectric.co.jp/en/document_search


Workaround

No workaround given by the vendor.

History

Tue, 04 Nov 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 04 Nov 2025 21:45:00 +0000

Type Values Removed Values Added
Description Fuji Electric Monitouch V-SFT-6 is vulnerable to a stack-based buffer overflow while processing a specially crafted project file, which may allow an attacker to execute arbitrary code.
Title Fuji Electric Monitouch V-SFT-6 Stack-based Buffer Overflow
Weaknesses CWE-121
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.4, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-11-04T21:46:06.843Z

Reserved: 2025-07-30T19:03:10.084Z

Link: CVE-2025-54526

cve-icon Vulnrichment

Updated: 2025-11-04T21:46:03.157Z

cve-icon NVD

Status : Received

Published: 2025-11-04T22:16:28.737

Modified: 2025-11-04T22:16:28.737

Link: CVE-2025-54526

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.