Impact
Delta Electronics COMMGR2 contains a stack-based buffer overflow that can allow an attacker to overwrite return addresses and arbitrary memory locations. Based on the vulnerability type and the corresponding CWE classification, the impact is high‑severity; an attacker who can trigger the overflow could potentially execute arbitrary code with the privileges of the COMMGR2 process, leading to full system compromise. The description explicitly states a stack-based buffer overflow, but does not detail the exact trigger conditions, so it is inferred that the flaw is exploitable when input data exceeds expected bounds.
Affected Systems
All versions of DeltaWW COMMGR2 prior to v2.11.1 are potentially affected; the vendor recommends upgrading to v2.11.1 or later for a fix. No further version granularity is provided in the data, so any older build should be considered vulnerable.
Risk and Exploitability
The CVSS score of 9.8 places this flaw in the critical range, though the EPSS score of less than 1% indicates that the likelihood of exploitation is currently low. The vulnerability is not listed in CISA's KEV catalog, suggesting no known active exploitation campaigns yet. The likely attack vector is through the application’s handling of external input—an attacker could send oversized or malformed data to the COMMGR2 service, trigger the overflow, and execute malicious code; this inference is based on the described stack buffer overflow.
OpenCVE Enrichment