overflow while processing a specially crafted project file, which may
allow an attacker to execute arbitrary code.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
Fuji Electric has addressed these vulnerabilities in their October release (V-SFT V6.2.8.0). They recommend users update to V6.2.9.0 or newer. https://felib.fujielectric.co.jp/en/document_search
Workaround
No workaround given by the vendor.
Tue, 04 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 04 Nov 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Fuji Electric Monitouch V-SFT-6 is vulnerable to a stack-based buffer overflow while processing a specially crafted project file, which may allow an attacker to execute arbitrary code. | |
| Title | Fuji Electric Monitouch V-SFT-6 Stack-based Buffer Overflow | |
| Weaknesses | CWE-121 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-11-04T21:46:06.843Z
Reserved: 2025-07-30T19:03:10.084Z
Link: CVE-2025-54526
Updated: 2025-11-04T21:46:03.157Z
Status : Received
Published: 2025-11-04T22:16:28.737
Modified: 2025-11-04T22:16:28.737
Link: CVE-2025-54526
No data.
OpenCVE Enrichment
No data.