Impact
The vulnerability is a stack‑based buffer overflow in the ASDA‑Soft application. The overflow can allow an attacker to overwrite the stack and potentially inject and execute malicious code, which may lead to a compromise of confidentiality, integrity, or availability. The impact is inferred from the nature of the bug and typical exploitation of stack overflows.
Affected Systems
DeltaWW ASDA‑Soft running on Windows is affected. Any installation older than version 7.2.6.0 is vulnerable, and the vendor recommends upgrading to 7.2.6.0 or later.
Risk and Exploitability
The CVSS score of 7.8 indicates high severity. The EPSS score of less than 1% suggests a low probability of exploitation at present, and the vulnerability is not listed in the CISA KEV catalog. Attackers are inferred to need access to the vulnerable ASDA‑Soft process, either through local user privileges or potentially via untrusted input, to trigger the overflow. The official remedy is to apply the available patch, which is the primary mitigation.
OpenCVE Enrichment