Delta Electronics DIAEnergie is vulnerable to an SQL injection in the script Handler_CFG.ashx. An authenticated attacker may be able to exploit this issue to cause delay in the targeted product.
Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. If a target visits a malicious page or opens a malicious file an attacker can leverage this vulnerability to execute code in the context of the current process.
Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. If a target visits a malicious page or opens a malicious file an attacker can leverage this vulnerability to execute code in the context of the current process.
Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can result in a memory corruption condition. If a target visits a malicious page or opens a malicious file an attacker can leverage this vulnerability to execute code in the context of the current process.
Delta Electronics DIAEnergie has insufficient input validation which makes it possible to perform a path traversal attack and write outside of the intended directory. If a file name is specified that already exists on the file system, then the original file will be overwritten.
Delta Electronics DIAEnergie is vulnerable to an SQL injection vulnerability that exists in the GetDIACloudList endpoint. An authenticated attacker can exploit this issue to potentially compromise the system on which DIAEnergie is deployed.
Delta Electronics DIAEnergie is vulnerable to an SQL injection vulnerability that exists in the script Handler_CFG.ashx. An authenticated attacker can exploit this issue to potentially compromise the system on which DIAEnergie is deployed.
A stack based buffer overflow exists in Delta Electronics Delta Industrial Automation DOPSoft when parsing the wTitleTextLen field of a DPS file. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to open a specially crafted DPS file to achieve remote code execution.
A stack based buffer overflow exists in Delta Electronics Delta Industrial Automation DOPSoft when parsing the wTTitleLen field of a DPS file. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to open a specially crafted DPS file to achieve remote code execution.
A stack based buffer overflow exists in Delta Electronics Delta Industrial Automation DOPSoft when parsing the wLogTitlesTimeLen field of a DPS file. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to open a specially crafted DPS file to achieve remote code execution.
A stack based buffer overflow exists in Delta Electronics Delta Industrial Automation DOPSoft when parsing the wLogTitlesActionLen field of a DPS file. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to open a specially crafted DPS file to achieve remote code execution.
A stack based buffer overflow exists in Delta Electronics Delta Industrial Automation DOPSoft when parsing the wLogTitlesPrevValueLen field of a DPS file. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to open a specially crafted DPS file to achieve remote code execution.
A stack based buffer overflow exists in Delta Electronics Delta Industrial Automation DOPSoft when parsing the InitialMacroLen field of a DPS file. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to open a specially crafted DPS file to achieve remote code execution.
A buffer overflow exists in Delta Electronics Delta Industrial Automation DOPSoft. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to open a specially crafted DPS file to achieve remote code execution.
In Delta Electronics InfraSuite Device Master v.1.0.7, a vulnerability exists that allows an attacker to write to any file to any location of the filesystem, which could lead to remote code execution.
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contains an improper access control vulnerability in which an attacker can use the Device-Gateway service and bypass authorization, which could result in privilege escalation.
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use Lua scripts, which could allow an attacker to remotely execute arbitrary code.
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contain a command injection vulnerability that could allow an attacker to inject arbitrary commands, which could result in remote code execution.
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 are affected by a deserialization vulnerability targeting the Device-gateway service, which could allow deserialization of requests prior to authentication, resulting in remote code execution.
A privilege escalation vulnerability exists in Delta Electronics InfraSuite Device Master 00.00.02a. A default user 'User', which is in the 'Read Only User' group, can view the password of another default user 'Administrator', which is in the 'Administrator' group. This allows any lower privileged user to log in as an administrator.
Delta Electronics DVW-W02W2-E2 1.5.0.10 is vulnerable to Command Injection via Crafted URL.
SQL Injection in HandlerTag_KID.ashx in Delta Electronics DIAEnergie versions prior to v1.9.02.001 allows an attacker to inject SQL queries via Network
SQL Injection in HandlerPage_KID.ashx in Delta Electronics DIAEnergie versions prior to v1.9.02.001 allows an attacker to inject SQL queries via Network
SQL Injection in FtyInfoSetting.aspx in Delta Electronics DIAEnergie versions prior to v1.9.02.001 allows an attacker to inject SQL queries via Network
SQL Injection in AM_EBillAnalysis.aspx in Delta Electronics DIAEnergie versions prior to v1.9.02.001 allows an attacker to inject SQL queries via Network
SQL Injection in Handler_CFG.ashx in Delta Electronics DIAEnergie versions prior to v1.9.02.001 allows an attacker to inject SQL queries via Network
Delta Electronics InfraSuite Device Master versions 00.00.01a and prior deserialize network packets without proper verification. If the device connects to an attacker-controlled server, the attacker could send maliciously crafted packets that would be deserialized and executed, leading to remote code execution.
Delta Electronics InfraSuite Device Master versions 00.00.01a and prior lacks authentication for a function that changes group privileges. An attacker could use this to create a denial-of-service state or escalate their own privileges.
Delta Electronics DIALink versions 1.2.4.0 and prior runs by default on HTTP, which may allow an attacker to be positioned between the traffic and perform a machine-in-the-middle attack to access information without authorization.
WPLSoft in Delta Electronics versions 2.45.0 and prior writes data from a file outside the bounds of the intended buffer space, which could cause memory corruption or may allow remote code execution.
WPLSoft in Delta Electronics versions 2.45.0 and prior utilizes a fixed length heap buffer where a value larger than the buffer can be read from a file into the buffer, causing the buffer to be overwritten, which may allow remote code execution or cause the application to crash.
WPLSoft in Delta Electronics versions 2.45.0 and prior utilizes a fixed length stack buffer where a value larger than the buffer can be read from a file into the buffer, causing the buffer to be overwritten, which may allow remote code execution or cause the application to crash.
Delta Electronics COMMGR has Stack-based Buffer Overflow vulnerability.
A heap buffer-overflow exists in Delta Electronics ISPSoft. An anonymous attacker can exploit this vulnerability by enticing a user to open a specially crafted DVP file to achieve code execution.
A buffer overflow vulnerability exists in Delta Electronics WPLSoft. An anonymous attacker can exploit this vulnerability by enticing a user to open a specially crafted DVP file to achieve code execution.
Delta Electronics CNCSoft-G2 lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.
Delta Electronics DIAView has Command Injection vulnerability.
Delta Electronics DIAScreen lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.
Delta Electronics DIAScreen lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.
Delta Electronics DIAScreen lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.
Delta Electronics DIAScreen lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.
Delta Electronics CNCSoft-G2 lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.
Delta Electronics CNCSoft-G2 lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.
Delta Electronics COMMGR has Code Injection vulnerability.
Delta Electronics DTN Soft Project File Parsing Deserialization of Untrusted Data Remote Code Execution
Delta Electronics DTM Soft Project File Parsing Deserialization of Untrusted Data Remote Code Execution
Delta Electronics ISPSoft version 3.20 is vulnerable to an Out-Of-Bounds Write vulnerability that could allow an attacker to execute arbitrary code when parsing ISP file.
Delta Electronics ISPSoft version 3.20 is vulnerable to an Out-Of-Bounds Write vulnerability that could allow an attacker to execute arbitrary code when parsing ISP file.
Delta Electronics ISPSoft version 3.20 is vulnerable to a Stack-Based buffer overflow vulnerability that could allow an attacker to execute arbitrary code when parsing DVP file.
Delta Electronics ISPSoft version 3.20 is vulnerable to an Out-Of-Bounds Write vulnerability that could allow an attacker to execute arbitrary code when parsing DVP file.
Delta Electronics ISPSoft version 3.20 is vulnerable to a Stack-Based buffer overflow vulnerability that could allow an attacker to leverage debugging logic to execute arbitrary code when parsing CBDGL file.
Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. If a target visits a malicious page or opens a malicious file an attacker can leverage this vulnerability to execute code in the context of the current process.
Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. If a target visits a malicious page or opens a malicious file an attacker can leverage this vulnerability to execute code in the context of the current process.
Delta Electronics DRASimuCAD STP File Parsing Type Confusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Electronics DRASimuCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of STP files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22450.
Delta Electronics DRASimuCAD ICS File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Electronics DRASimuCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of ICS files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22415.
Delta Electronics DRASimuCAD STP File Parsing Type Confusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Electronics DRASimuCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of STP files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22414.
Delta Electronics DTM Soft deserializes objects, which could allow an attacker to execute arbitrary code.
If an attacker tricks a valid user into running Delta Electronics DIAScreen with a file containing malicious code, a stack-based buffer overflow in BACnetObjectInfo can be exploited, allowing the attacker to remotely execute arbitrary code.
If an attacker tricks a valid user into running Delta Electronics DIAScreen with a file containing malicious code, a stack-based buffer overflow in BACnetParameter can be exploited, allowing the attacker to remotely execute arbitrary code.
If an attacker tricks a valid user into running Delta Electronics DIAScreen with a file containing malicious code, a stack-based buffer overflow in CEtherIPTagItem can be exploited, allowing the attacker to remotely execute arbitrary code.
Delta Electronics CNCSoft-G2 lacks proper initialization of memory prior to accessing it. An attacker can manipulate users to visit a malicious page or file to leverage this vulnerability to execute code in the context of the current process.
Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can manipulate users to visit a malicious page or file to leverage this vulnerability to execute code in the context of the current process.
Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can manipulate users to visit a malicious page or file to leverage this vulnerability to execute code in the context of the current process.
Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can manipulate users to visit a malicious page or file to leverage this vulnerability to execute code in the context of the current process.
Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can manipulate an insider to visit a malicious page or file to leverage this vulnerability to execute code in the context of the current process.
A crafted DPA file could force Delta Electronics DIAScreen to overflow a stack-based buffer, which could allow an attacker to execute arbitrary code.
Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. If a target visits a malicious page or opens a malicious file an attacker can leverage this vulnerability to execute code in the context of the current process.
Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
Delta Electronics CNCSoft-B versions 1.0.0.4 and prior are vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code.
Delta Electronics CNCSoft-B DOPSoft prior to v4.0.0.82 insecurely loads libraries, which may allow an attacker to use DLL hijacking and take over the system where the software is installed.
Delta Electronics DOPSoft is vulnerable to a stack-based buffer overflow, which may allow for arbitrary code execution if an attacker can lead a legitimate user to execute a specially crafted file.
Delta Electronics DIAScreen may write past the end of an allocated buffer while parsing a specially crafted input file. This could allow an attacker to execute code in the context of the current process.
Delta Electronics' CNCSoft-B version 1.0.0.4 and DOPSoft versions 4.0.0.82 and prior are vulnerable to stack-based buffer overflow, which could allow an attacker to execute arbitrary code.
Delta Electronics' CNCSoft-B DOPSoft versions 1.0.0.4 and prior are vulnerable to stack-based buffer overflow, which could allow an attacker to execute arbitrary code.
Delta Electronics' CNCSoft-B DOPSoft versions 1.0.0.4 and prior are vulnerable to heap-based buffer overflow, which could allow an attacker to execute arbitrary code.
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 are affected by a deserialization vulnerability targeting the Device-DataCollect service, which could allow deserialization of requests prior to authentication, resulting in remote code execution.
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could set incorrect directory permissions, which could result in local privilege escalation.
Delta Electronics DIAScreen versions 1.2.1.23 and prior are vulnerable to a buffer overflow through improper restrictions of operations within memory, which could allow an attacker to remotely execute arbitrary code.
Delta Electronics DIAScreen versions 1.2.1.23 and prior are vulnerable to a stack-based buffer overflow, which could allow an attacker to remotely execute arbitrary code.
Delta Electronics DIAScreen versions 1.2.1.23 and prior are vulnerable to out-of-bounds write, which may allow an attacker to remotely execute arbitrary code.
Delta Electronics DOPSoft versions 4.00.16.22 and prior are vulnerable to an out-of-bounds write, which could allow an attacker to remotely execute arbitrary code when a malformed file is introduced to the software.
Delta Electronics DOPSoft versions 4.00.16.22 and prior are vulnerable to a stack-based buffer overflow, which could allow an attacker to remotely execute arbitrary code when a malformed file is introduced to the software.
Delta Electronics DIAScreen versions prior to 1.1.0 are vulnerable to an out-of-bounds write condition, which may result in a system crash or allow an attacker to remotely execute arbitrary code.
Delta Electronics DIAScreen versions prior to 1.1.0 are vulnerable to type confusion, which may allow an attacker to remotely execute arbitrary code.
Delta Electronics DIAEnergie (all versions prior to 1.8.02.004) are vulnerable to a DLL hijacking condition. When combined with the Incorrect Default Permissions vulnerability of 4.2.2 above, this makes it possible for an attacker to escalate privileges
Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) is vulnerable to an incorrect default permission in the DIAEnergie application, which may allow an attacker to plant new files (such as DLLs) or replace existing executable files.
Delta Electronics CNCSoft Versions 1.01.30 and prior are vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code.
Delta Electronics DIALink versions 1.2.4.0 and prior stores sensitive information in cleartext, which may allow an attacker to have extensive access to the application directory and escalate privileges.
Delta Electronics DIALink versions 1.2.4.0 and prior default permissions give extensive permissions to low-privileged user accounts, which may allow an attacker to modify the installation directory and upload malicious files.
Delta Electronics DIALink versions 1.2.4.0 and prior insecurely loads libraries, which may allow an attacker to use DLL hijacking and takeover the system where the software is installed.
A stack-based buffer overflow vulnerability in Delta Electronics DOPSoft Version 4.00.11 and prior may be exploited by processing a specially crafted project file, which may allow an attacker to execute arbitrary code.
A heap-based buffer overflow in Delta Electronics TPEditor: v1.98.06 and prior may be exploited by processing a specially crafted project file. Successful exploitation of this vulnerability may allow an attacker to execute arbitrary code.
Delta Electronics DOPSoft Versions 4.0.10.17 and prior are vulnerable to an out-of-bounds read, which may allow an attacker to execute arbitrary code.
Delta Electronics' CNCSoft ScreenEditor in versions prior to v1.01.30 could allow the corruption of data, a denial-of-service condition, or code execution. The vulnerability may allow an attacker to remotely execute arbitrary code.
Delta Electronics CNCSoft-B Versions 1.0.0.2 and prior has a type confusion issue while processing project files, which may allow an attacker to execute arbitrary code.
Delta Electronics CNCSoft-B Versions 1.0.0.2 and prior is vulnerable to an out-of-bounds read while processing project files, which may allow an attacker to execute arbitrary code.
Delta Electronics CNCSoft-B Versions 1.0.0.2 and prior has a null pointer dereference issue while processing project files, which may allow an attacker to execute arbitrary code.
Delta Electronics CNCSoft-B Versions 1.0.0.2 and prior is vulnerable to an out-of-bounds write while processing project files, which may allow an attacker to execute arbitrary code.
A stack-based buffer overflow may exist in Delta Electronics CNCSoft ScreenEditor versions 1.01.26 and prior when processing specially crafted project files, which may allow an attacker to execute arbitrary code.
Delta Electronics DOPSoft Version 4.0.8.21 and prior has a null pointer dereference issue while processing project files, which may allow an attacker to execute arbitrary code.
Delta Electronics DOPSoft Version 4.0.8.21 and prior is vulnerable to an out-of-bounds write while processing project files, which may allow an attacker to execute arbitrary code.
Delta Electronics TPEditor Versions 1.97 and prior. An improper input validation may be exploited by processing a specially crafted project file not validated when the data is entered by a user. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.
Delta Electronics TPEditor Versions 1.97 and prior. A write-what-where condition may be exploited by processing a specially crafted project file. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.
Delta Electronics TPEditor Versions 1.97 and prior. A heap-based buffer overflow may be exploited by processing a specially crafted project file. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.
Delta Electronics TPEditor Versions 1.97 and prior. A stack-based buffer overflow may be exploited by processing a specially crafted project file. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.
Delta Electronics TPEditor Versions 1.97 and prior. An out-of-bounds read may be exploited by processing specially crafted project files. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.
Delta Electronics TPEditor, Versions 1.94 and prior. Multiple out-of-bounds write vulnerabilities may be exploited by processing specially crafted project files, which may allow remote code execution.
Delta Electronics TPEditor, Versions 1.94 and prior. Multiple stack-based buffer overflow vulnerabilities may be exploited by processing specially crafted project files, which may allow an attacker to remotely execute arbitrary code.
Delta Electronics TPEditor, Versions 1.94 and prior. Multiple heap-based buffer overflow vulnerabilities may be exploited by processing specially crafted project files, which may allow an attacker to remotely execute arbitrary code.
Delta Electronics CNCSoft ScreenEditor, Versions 1.00.89 and prior. Multiple heap-based buffer overflow vulnerabilities may be exploited by processing specially crafted project files, allowing an attacker to remotely execute arbitrary code. There is a lack of user input validation before copying data from project files onto the heap.
Delta Electronics ISPSoft version 3.0.5 and prior allow an attacker, by opening a crafted file, to cause the application to read past the boundary allocated to a stack object, which could allow execution of code under the context of the application.
Delta PMSoft versions 2.10 and prior have multiple stack-based buffer overflow vulnerabilities where a .ppm file can introduce a value larger than is readable by PMSoft's fixed-length stack buffer. This can cause the buffer to be overwritten, which may allow arbitrary code execution or cause the application to crash. CVSS v3 base score: 7.1; CVSS vector string: AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H. Delta Electronics recommends affected users update to at least PMSoft v2.11, which was made available as of March 22, 2018, or the latest available version.
A Stack-based Buffer Overflow issue was discovered in Delta Electronics Delta Industrial Automation DOPSoft, Version 4.00.01 or prior. Stack-based buffer overflow vulnerabilities caused by processing specially crafted .dop or .dpb files may allow an attacker to remotely execute arbitrary code.
A Stack-based Buffer Overflow issue was discovered in Delta Electronics Delta Industrial Automation Screen Editor, Version 2.00.23.00 or prior. Stack-based buffer overflow vulnerabilities caused by processing specially crafted .dpb files may allow an attacker to remotely execute arbitrary code.
A Use-after-Free issue was discovered in Delta Electronics Delta Industrial Automation Screen Editor, Version 2.00.23.00 or prior. Specially crafted .dpb files could exploit a use-after-free vulnerability.
An Out-of-bounds Write issue was discovered in Delta Electronics Delta Industrial Automation Screen Editor, Version 2.00.23.00 or prior. Specially crafted .dpb files may cause the system to write outside the intended buffer area.
A Type Confusion issue was discovered in Delta Electronics Delta Industrial Automation Screen Editor, Version 2.00.23.00 or prior. An access of resource using incompatible type ('type confusion') vulnerability may allow an attacker to execute remote code when processing specially crafted .dpb files.
An issue was discovered in Delta Electronics WPLSoft, Versions prior to V2.42.11, ISPSoft, Versions prior to 3.02.11, and PMSoft, Versions prior to2.10.10. There are multiple instances of heap-based buffer overflows that may allow malicious files to cause the execution of arbitrary code or a denial of service.
An issue was discovered in Delta Electronics WPLSoft, Versions prior to V2.42.11, ISPSoft, Versions prior to 3.02.11, and PMSoft, Versions prior to 2.10.10. Multiple instances of out-of-bounds write conditions may allow malicious files to be read and executed by the affected software.
Delta Electronics COMMGR2 has Buffer Over-read DoS vulnerability.
A denial of service vulnerability exists in Delta Electronics DIAEnergie v1.10.1.8610 and prior. When processing an 'ICS Restart!' message, CEBC.exe restarts the system.
A buffer overflow exists in Delta Electronics Delta Industrial Automation DOPSoft version 2 when parsing the wMailContentLen field of a DPS file. An anonymous attacker can exploit this vulnerability by enticing a user to open a specially crafted DPS file to achieve code execution.
In Delta Electronics InfraSuite Device Master v.1.0.7, A vulnerability exists that allows an unauthenticated attacker to disclose user information through a single UDP packet, obtain plaintext credentials, or perform NTLM relaying.
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use URL decoding to retrieve system files, credentials, and bypass authentication resulting in privilege escalation.
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contain an improper access control vulnerability, which could allow an attacker to retrieve Gateway configuration files to obtain plaintext credentials.
Delta Electronics InfraSuite Device Master versions 00.00.01a and prior allow unauthenticated users to trigger the WriteConfiguration method, which could allow an attacker to provide new values for user configuration files such as UserListInfo.xml. This could lead to the changing of administrative passwords.
Delta Electronics InfraSuite Device Master versions 00.00.01a and prior allow unauthenticated users to access the aprunning endpoint, which could allow an attacker to retrieve any file from the “RunningConfigs” directory. The attacker could then view and modify configuration files such as UserListInfo.xml, which would allow them to see existing administrative passwords.
Delta Electronics DIALink has an Directory Traversal Authentication Bypass Vulnerability.
Delta Electronics CNCSoft-G2 lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.
Delta Electronics CNCSoft lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.
Delta Electronics CNCSoft lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.
Delta Electronics CNCSoft lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.
Delta Electronics CNCSoft lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.
Delta Electronics DX-2100-L1-CN 2.42 is vulnerable to Command Injection via lform/net_diagnose.
A buffer overflow vulnerability exists in Delta Electronics Delta Industrial Automation DOPSoft version 2 when parsing the wScreenDESCTextLen field of a DPS file. An anonymous attacker can exploit this vulnerability by enticing a user to open a specially crafted DPS file to achieve code execution.
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 are affected by a path traversal vulnerability, which could allow an attacker to read local files, disclose plaintext credentials, and escalate privileges.
Delta Electronics DIAEnergie (Version 1.7.5 and prior) is vulnerable to cleartext transmission as the web application runs by default on HTTP. This could allow an attacker to remotely read transmitted information between the client and product.
| CVE ID ⇅ | Severity ↓ | Description | |
|---|---|---|---|
| CVE-2024-42417 | HIGH | Delta Electronics DIAEnergie is vulnerable to an SQL injection in the script Handler_CFG.ashx. An au… | › |
| CVE-2024-39883 | HIGH | Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to co… | › |
| CVE-2024-39882 | HIGH | Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can result in a re… | › |
| CVE-2024-39881 | HIGH | Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can result in a me… | › |
| CVE-2024-34033 | HIGH | Delta Electronics DIAEnergie has insufficient input validation which makes it possible to perform a… | › |
| CVE-2024-34032 | HIGH | Delta Electronics DIAEnergie is vulnerable to an SQL injection vulnerability that exists in the Get… | › |
| CVE-2024-34031 | HIGH | Delta Electronics DIAEnergie is vulnerable to an SQL injection vulnerability that exists in the scr… | › |
| CVE-2023-43824 | HIGH | A stack based buffer overflow exists in Delta Electronics Delta Industrial Automation DOPSoft when p… | › |
| CVE-2023-43823 | HIGH | A stack based buffer overflow exists in Delta Electronics Delta Industrial Automation DOPSoft when p… | › |
| CVE-2023-43822 | HIGH | A stack based buffer overflow exists in Delta Electronics Delta Industrial Automation DOPSoft when p… | › |
| CVE-2023-43821 | HIGH | A stack based buffer overflow exists in Delta Electronics Delta Industrial Automation DOPSoft when p… | › |
| CVE-2023-43820 | HIGH | A stack based buffer overflow exists in Delta Electronics Delta Industrial Automation DOPSoft when p… | › |
| CVE-2023-43819 | HIGH | A stack based buffer overflow exists in Delta Electronics Delta Industrial Automation DOPSoft when p… | › |
| CVE-2023-43818 | HIGH | A buffer overflow exists in Delta Electronics Delta Industrial Automation DOPSoft. A remote, unauthe… | › |
| CVE-2023-46690 | HIGH | In Delta Electronics InfraSuite Device Master v.1.0.7, a vulnerability exists that allows an attacke… | › |
| CVE-2023-1144 | HIGH | Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contains an improper access contr… | › |
| CVE-2023-1143 | HIGH | In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use Lua scr… | › |
| CVE-2023-1141 | HIGH | Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contain a command injection vulne… | › |
| CVE-2023-1139 | HIGH | Delta Electronics InfraSuite Device Master versions prior to 1.0.5 are affected by a deserialization… | › |
| CVE-2023-0444 | HIGH | A privilege escalation vulnerability exists in Delta Electronics InfraSuite Device Master 00.00.02a.… | › |
| CVE-2022-42139 | HIGH | Delta Electronics DVW-W02W2-E2 1.5.0.10 is vulnerable to Command Injection via Crafted URL. | › |
| CVE-2022-43506 | HIGH | SQL Injection in HandlerTag_KID.ashx in Delta Electronics DIAEnergie versions prior to v1.9.0… | › |
| CVE-2022-43457 | HIGH | SQL Injection in HandlerPage_KID.ashx in Delta Electronics DIAEnergie versions prior to … | › |
| CVE-2022-43452 | HIGH | SQL Injection in FtyInfoSetting.aspx in Delta Electronics DIAEnergie versions prior to… | › |
| CVE-2022-43447 | HIGH | SQL Injection in AM_EBillAnalysis.aspx in Delta Electronics DIAEnergie versions prior to v… | › |
| CVE-2022-41775 | HIGH | SQL Injection in Handler_CFG.ashx in Delta Electronics DIAEnergie versions prior to v1.9.02.… | › |
| CVE-2022-41779 | HIGH | Delta Electronics InfraSuite Device Master versions 00.00.01a and prior deserialize network packets… | › |
| CVE-2022-41644 | HIGH | Delta Electronics InfraSuite Device Master versions 00.00.01a and prior lacks authentication for … | › |
| CVE-2021-38418 | HIGH | Delta Electronics DIALink versions 1.2.4.0 and prior runs by default on HTTP, which may allow an att… | › |
| CVE-2018-7509 | HIGH | WPLSoft in Delta Electronics versions 2.45.0 and prior writes data from a file outside the bounds of… | › |
| CVE-2018-7507 | HIGH | WPLSoft in Delta Electronics versions 2.45.0 and prior utilizes a fixed length heap buffer where a v… | › |
| CVE-2018-7494 | HIGH | WPLSoft in Delta Electronics versions 2.45.0 and prior utilizes a fixed length stack buffer where a … | › |
| CVE-2025-53418 | HIGH | Delta Electronics COMMGR has Stack-based Buffer Overflow vulnerability. | › |
| CVE-2023-5131 | HIGH | A heap buffer-overflow exists in Delta Electronics ISPSoft. An anonymous attacker can exploit this v… | › |
| CVE-2023-5130 | HIGH | A buffer overflow vulnerability exists in Delta Electronics WPLSoft. An anonymous attacker can explo… | › |
| CVE-2026-3094 | HIGH | Delta Electronics CNCSoft-G2 lacks proper validation of the user-supplied file. If a user opens a ma… | › |
| CVE-2026-0975 | HIGH | Delta Electronics DIAView has Command Injection vulnerability. | › |
| CVE-2025-59300 | HIGH | Delta Electronics DIAScreen lacks proper validation of the user-supplied file. If a user opens a mal… | › |
| CVE-2025-59299 | HIGH | Delta Electronics DIAScreen lacks proper validation of the user-supplied file. If a user opens a mal… | › |
| CVE-2025-59298 | HIGH | Delta Electronics DIAScreen lacks proper validation of the user-supplied file. If a user opens a mal… | › |
| CVE-2025-59297 | HIGH | Delta Electronics DIAScreen lacks proper validation of the user-supplied file. If a user opens a mal… | › |
| CVE-2025-58319 | HIGH | Delta Electronics CNCSoft-G2 lacks proper validation of the user-supplied file. If a user opens a ma… | › |
| CVE-2025-58317 | HIGH | Delta Electronics CNCSoft-G2 lacks proper validation of the user-supplied file. If a user opens a ma… | › |
| CVE-2025-53419 | HIGH | Delta Electronics COMMGR has Code Injection vulnerability. | › |
| CVE-2025-53416 | HIGH | Delta Electronics DTN Soft Project File Parsing Deserialization of Untrusted Data Remote Code Execut… | › |
| CVE-2025-53415 | HIGH | Delta Electronics DTM Soft Project File Parsing Deserialization of Untrusted Data Remote Code Execut… | › |
| CVE-2025-4125 | HIGH | Delta Electronics ISPSoft version 3.20 is vulnerable to an Out-Of-Bounds Write vulnerability that co… | › |
| CVE-2025-4124 | HIGH | Delta Electronics ISPSoft version 3.20 is vulnerable to an Out-Of-Bounds Write vulnerability that co… | › |
| CVE-2025-22884 | HIGH | Delta Electronics ISPSoft version 3.20 is vulnerable to a Stack-Based buffer overflow vulnerability … | › |
| CVE-2025-22883 | HIGH | Delta Electronics ISPSoft version 3.20 is vulnerable to an Out-Of-Bounds Write vulnerability that co… | › |
| CVE-2025-22882 | HIGH | Delta Electronics ISPSoft version 3.20 is vulnerable to a Stack-Based buffer overflow vulnerability … | › |
| CVE-2025-22881 | HIGH | Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to co… | › |
| CVE-2025-22880 | HIGH | Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to co… | › |
| CVE-2024-12836 | HIGH | Delta Electronics DRASimuCAD STP File Parsing Type Confusion Remote Code Execution Vulnerability. Th… | › |
| CVE-2024-12835 | HIGH | Delta Electronics DRASimuCAD ICS File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerabilit… | › |
| CVE-2024-12834 | HIGH | Delta Electronics DRASimuCAD STP File Parsing Type Confusion Remote Code Execution Vulnerability. Th… | › |
| CVE-2024-12677 | HIGH | Delta Electronics DTM Soft deserializes objects, which could allow an attacker to execute arbitrary … | › |
| CVE-2024-47131 | HIGH | If an attacker tricks a valid user into running Delta Electronics DIAScreen with a file containing m… | › |
| CVE-2024-39605 | HIGH | If an attacker tricks a valid user into running Delta Electronics DIAScreen with a file containing m… | › |
| CVE-2024-39354 | HIGH | If an attacker tricks a valid user into running Delta Electronics DIAScreen with a file containing m… | › |
| CVE-2024-47966 | HIGH | Delta Electronics CNCSoft-G2 lacks proper initialization of memory prior to accessing it. An attacke… | › |
| CVE-2024-47965 | HIGH | Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can result in a re… | › |
| CVE-2024-47964 | HIGH | Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to co… | › |
| CVE-2024-47963 | HIGH | Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can result in a wr… | › |
| CVE-2024-47962 | HIGH | Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to co… | › |
| CVE-2024-7502 | HIGH | A crafted DPA file could force Delta Electronics DIAScreen to overflow a stack-based buffer, which c… | › |
| CVE-2024-39880 | HIGH | Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to co… | › |
| CVE-2024-4192 | HIGH | Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to c… | › |
| CVE-2024-1941 | HIGH | Delta Electronics CNCSoft-B versions 1.0.0.4 and prior are vulnerable to a stack-based buffer overf… | › |
| CVE-2024-1595 | HIGH | Delta Electronics CNCSoft-B DOPSoft prior to v4.0.0.82 insecurely loads libraries, which may allow… | › |
| CVE-2023-5944 | HIGH | Delta Electronics DOPSoft is vulnerable to a stack-based buffer overflow, which may allow for arbit… | › |
| CVE-2023-5068 | HIGH | Delta Electronics DIAScreen may write past the end of an allocated buffer while parsing a specially… | › |
| CVE-2023-4685 | HIGH | Delta Electronics' CNCSoft-B version 1.0.0.4 and DOPSoft versions 4.0.0.82 and prior are vulnerable … | › |
| CVE-2023-25177 | HIGH | Delta Electronics' CNCSoft-B DOPSoft versions 1.0.0.4 and prior are vulnerable to stack-based buff… | › |
| CVE-2023-24014 | HIGH | Delta Electronics' CNCSoft-B DOPSoft versions 1.0.0.4 and prior are vulnerable to heap-based buffer… | › |
| CVE-2023-1145 | HIGH | Delta Electronics InfraSuite Device Master versions prior to 1.0.5 are affected by a deserial… | › |
| CVE-2023-1135 | HIGH | In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an a… | › |
| CVE-2023-0251 | HIGH | Delta Electronics DIAScreen versions 1.2.1.23 and prior are vulnerable to a buffer overflow through … | › |
| CVE-2023-0250 | HIGH | Delta Electronics DIAScreen versions 1.2.1.23 and prior are vulnerable to a stack-based buffer overf… | › |
| CVE-2023-0249 | HIGH | Delta Electronics DIAScreen versions 1.2.1.23 and prior are vulnerable to out-of-bounds write, which… | › |
| CVE-2023-0124 | HIGH | Delta Electronics DOPSoft versions 4.00.16.22 and prior are vulnerable to an out-of-bounds write, wh… | › |
| CVE-2023-0123 | HIGH | Delta Electronics DOPSoft versions 4.00.16.22 and prior are vulnerable to a stack-based buffer overf… | › |
| CVE-2021-32969 | HIGH | Delta Electronics DIAScreen versions prior to 1.1.0 are vulnerable to an out-of-bounds write conditi… | › |
| CVE-2021-32965 | HIGH | Delta Electronics DIAScreen versions prior to 1.1.0 are vulnerable to type confusion, which may allo… | › |
| CVE-2022-1098 | HIGH | Delta Electronics DIAEnergie (all versions prior to 1.8.02.004) are vulnerable to a DLL hijacking co… | › |
| CVE-2022-26839 | HIGH | Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) is vulnerable to an incorrect defaul… | › |
| CVE-2021-43982 | HIGH | Delta Electronics CNCSoft Versions 1.01.30 and prior are vulnerable to a stack-based buffer overflow… | › |
| CVE-2021-38422 | HIGH | Delta Electronics DIALink versions 1.2.4.0 and prior stores sensitive information in cleartext, whic… | › |
| CVE-2021-38420 | HIGH | Delta Electronics DIALink versions 1.2.4.0 and prior default permissions give extensive permissions … | › |
| CVE-2021-38416 | HIGH | Delta Electronics DIALink versions 1.2.4.0 and prior insecurely loads libraries, which may allow an … | › |
| CVE-2021-33019 | HIGH | A stack-based buffer overflow vulnerability in Delta Electronics DOPSoft Version 4.00.11 and prior m… | › |
| CVE-2021-33007 | HIGH | A heap-based buffer overflow in Delta Electronics TPEditor: v1.98.06 and prior may be exploited by p… | › |
| CVE-2021-27412 | HIGH | Delta Electronics DOPSoft Versions 4.0.10.17 and prior are vulnerable to an out-of-bounds read, whic… | › |
| CVE-2021-22672 | HIGH | Delta Electronics' CNCSoft ScreenEditor in versions prior to v1.01.30 could allow the corruption of … | › |
| CVE-2020-27293 | HIGH | Delta Electronics CNCSoft-B Versions 1.0.0.2 and prior has a type confusion issue while processing p… | › |
| CVE-2020-27291 | HIGH | Delta Electronics CNCSoft-B Versions 1.0.0.2 and prior is vulnerable to an out-of-bounds read while … | › |
| CVE-2020-27289 | HIGH | Delta Electronics CNCSoft-B Versions 1.0.0.2 and prior has a null pointer dereference issue while pr… | › |
| CVE-2020-27287 | HIGH | Delta Electronics CNCSoft-B Versions 1.0.0.2 and prior is vulnerable to an out-of-bounds write while… | › |
| CVE-2020-27281 | HIGH | A stack-based buffer overflow may exist in Delta Electronics CNCSoft ScreenEditor versions 1.01.26 a… | › |
| CVE-2020-27277 | HIGH | Delta Electronics DOPSoft Version 4.0.8.21 and prior has a null pointer dereference issue while proc… | › |
| CVE-2020-27275 | HIGH | Delta Electronics DOPSoft Version 4.0.8.21 and prior is vulnerable to an out-of-bounds write while p… | › |
| CVE-2020-16227 | HIGH | Delta Electronics TPEditor Versions 1.97 and prior. An improper input validation may be exploited by… | › |
| CVE-2020-16225 | HIGH | Delta Electronics TPEditor Versions 1.97 and prior. A write-what-where condition may be exploited by… | › |
| CVE-2020-16223 | HIGH | Delta Electronics TPEditor Versions 1.97 and prior. A heap-based buffer overflow may be exploited by… | › |
| CVE-2020-16221 | HIGH | Delta Electronics TPEditor Versions 1.97 and prior. A stack-based buffer overflow may be exploited b… | › |
| CVE-2020-16219 | HIGH | Delta Electronics TPEditor Versions 1.97 and prior. An out-of-bounds read may be exploited by proces… | › |
| CVE-2019-13544 | HIGH | Delta Electronics TPEditor, Versions 1.94 and prior. Multiple out-of-bounds write vulnerabilities ma… | › |
| CVE-2019-13540 | HIGH | Delta Electronics TPEditor, Versions 1.94 and prior. Multiple stack-based buffer overflow vulnerabil… | › |
| CVE-2019-13536 | HIGH | Delta Electronics TPEditor, Versions 1.94 and prior. Multiple heap-based buffer overflow vulnerabili… | › |
| CVE-2019-10982 | HIGH | Delta Electronics CNCSoft ScreenEditor, Versions 1.00.89 and prior. Multiple heap-based buffer overf… | › |
| CVE-2018-14800 | HIGH | Delta Electronics ISPSoft version 3.0.5 and prior allow an attacker, by opening a crafted file, to c… | › |
| CVE-2018-8839 | HIGH | Delta PMSoft versions 2.10 and prior have multiple stack-based buffer overflow vulnerabilities where… | › |
| CVE-2018-5476 | HIGH | A Stack-based Buffer Overflow issue was discovered in Delta Electronics Delta Industrial Automation … | › |
| CVE-2017-16751 | HIGH | A Stack-based Buffer Overflow issue was discovered in Delta Electronics Delta Industrial Automation … | › |
| CVE-2017-16749 | HIGH | A Use-after-Free issue was discovered in Delta Electronics Delta Industrial Automation Screen Editor… | › |
| CVE-2017-16747 | HIGH | An Out-of-bounds Write issue was discovered in Delta Electronics Delta Industrial Automation Screen … | › |
| CVE-2017-16745 | HIGH | A Type Confusion issue was discovered in Delta Electronics Delta Industrial Automation Screen Editor… | › |
| CVE-2016-5805 | HIGH | An issue was discovered in Delta Electronics WPLSoft, Versions prior to V2.42.11, ISPSoft, Versions … | › |
| CVE-2016-5802 | HIGH | An issue was discovered in Delta Electronics WPLSoft, Versions prior to V2.42.11, ISPSoft, Versions … | › |
| CVE-2026-3631 | HIGH | Delta Electronics COMMGR2 has Buffer Over-read DoS vulnerability. | › |
| CVE-2024-4549 | HIGH | A denial of service vulnerability exists in Delta Electronics DIAEnergie v1.10.1.8610 and prior. Whe… | › |
| CVE-2023-43817 | HIGH | A buffer overflow exists in Delta Electronics Delta Industrial Automation DOPSoft version 2 when par… | › |
| CVE-2023-47279 | HIGH | In Delta Electronics InfraSuite Device Master v.1.0.7, A vulnerability exists that allows an unauthe… | › |
| CVE-2023-1142 | HIGH | In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use URL dec… | › |
| CVE-2023-1138 | HIGH | Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contain an improper access contro… | › |
| CVE-2022-41776 | HIGH | Delta Electronics InfraSuite Device Master versions 00.00.01a and prior allow unauthenticated users… | › |
| CVE-2022-41629 | HIGH | Delta Electronics InfraSuite Device Master versions 00.00.01a and prior allow unauthenticated users… | › |
| CVE-2025-58320 | HIGH | Delta Electronics DIALink has an Directory Traversal Authentication Bypass Vulnerability. | › |
| CVE-2025-47728 | HIGH | Delta Electronics CNCSoft-G2 lacks proper validation of the user-supplied file. If a user opens a ma… | › |
| CVE-2025-47727 | HIGH | Delta Electronics CNCSoft lacks proper validation of the user-supplied file. If a user opens a malic… | › |
| CVE-2025-47726 | HIGH | Delta Electronics CNCSoft lacks proper validation of the user-supplied file. If a user opens a malic… | › |
| CVE-2025-47725 | HIGH | Delta Electronics CNCSoft lacks proper validation of the user-supplied file. If a user opens a malic… | › |
| CVE-2025-47724 | HIGH | Delta Electronics CNCSoft lacks proper validation of the user-supplied file. If a user opens a malic… | › |
| CVE-2022-42140 | HIGH | Delta Electronics DX-2100-L1-CN 2.42 is vulnerable to Command Injection via lform/net_diagnose. | › |
| CVE-2023-43815 | HIGH | A buffer overflow vulnerability exists in Delta Electronics Delta Industrial Automation DOPSoft vers… | › |
| CVE-2023-1134 | HIGH | Delta Electronics InfraSuite Device Master versions prior to 1.0.5 are affected by a path traversal … | › |
| CVE-2022-0988 | HIGH | Delta Electronics DIAEnergie (Version 1.7.5 and prior) is vulnerable to cleartext transmission as th… | › |