CVE-2025-22881

Published Feb 26, 2025

Last updated a month ago

Overview

Description
Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. If a target visits a malicious page or opens a malicious file an attacker can leverage this vulnerability to execute code in the context of the current process.
Source
759f5e80-c8e1-4224-bead-956d7b33c98b
NVD status
Received

Risk scores

CVSS 4.0

Type
Secondary
Base score
8.4
Impact score
-
Exploitability score
-
Vector string
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Severity
HIGH

Weaknesses

759f5e80-c8e1-4224-bead-956d7b33c98b
CWE-122

Social media

Hype score
Not currently trending
  1. Actively exploited CVE : CVE-2025-22881

    @transilienceai

    17 Mar 2025

    16 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  2. Actively exploited CVE : CVE-2025-22881

    @transilienceai

    17 Mar 2025

    10 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  3. Actively exploited CVE : CVE-2025-22881

    @transilienceai

    17 Mar 2025

    21 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  4. Actively exploited CVE : CVE-2025-22881

    @transilienceai

    16 Mar 2025

    21 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  5. Actively exploited CVE : CVE-2025-22881

    @transilienceai

    16 Mar 2025

    8 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  6. Actively exploited CVE : CVE-2025-22881

    @transilienceai

    15 Mar 2025

    13 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  7. Actively exploited CVE : CVE-2025-22881

    @transilienceai

    14 Mar 2025

    12 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  8. Actively exploited CVE : CVE-2025-22881

    @transilienceai

    11 Mar 2025

    17 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  9. Actively exploited CVE : CVE-2025-22881

    @transilienceai

    10 Mar 2025

    11 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  10. Actively exploited CVE : CVE-2025-22881

    @transilienceai

    10 Mar 2025

    13 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  11. Actively exploited CVE : CVE-2025-22881

    @transilienceai

    9 Mar 2025

    8 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  12. Actively exploited CVE : CVE-2025-22881

    @transilienceai

    7 Mar 2025

    7 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  13. Actively exploited CVE : CVE-2025-22881

    @transilienceai

    7 Mar 2025

    13 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  14. ⚠️ Vulnerability Alert: Heap-based Buffer Overflow in Delta Electronics CNCSoft-G2 📅 Timeline: Disclosure: 2025-03-05, Expected Patch: N/A 📌 Attribution: 🆔cveId: CVE-2025-22881 📊baseScore: 7.5 📏cvssMetrics: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H cvssSeverity: High 🟠… https

    @syedaquib77

    5 Mar 2025

    32 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  15. Actively exploited CVE : CVE-2025-22881

    @transilienceai

    5 Mar 2025

    12 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  16. 🚨 CVE-2025-22881 🔴 HIGH (8.4) 🏢 Delta Electronics - CNCSoft-G2 🏗️ 0 🔗 https://t.co/84fShn5BwK #CyberCron #VulnAlert https://t.co/tANeL4g1gM

    @cybercronai

    27 Feb 2025

    110 Impressions

    0 Retweets

    3 Likes

    0 Bookmarks

    0 Replies

    1 Quote

  17. [CVE-2025-22881: HIGH] Delta Electronics CNCSoft-G2 is vulnerable to a lack of user-supplied data validation, which can lead to code execution by attackers. Stay vigilant against cyber threats.#cybersecurity,#vulnerability https://t.co/4rlrvDoUgt https://t.co/tdNVCv0G7m

    @CveFindCom

    26 Feb 2025

    58 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes