CVE-2026-1361
Stack-based Buffer Overflow in ASDA-Soft Causes Potential Crash
Publication date: 2026-01-27
Last updated on: 2026-02-17
Assigner: Deltaww
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| deltaww | asda_soft | to 7.2.2.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
| CWE-121 | A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-1361 is a high-severity stack-based buffer overflow vulnerability (CWE-121) affecting ASDA-Soft versions 7.2.0.0 and earlier. This type of vulnerability occurs when a program writes more data to a buffer located on the stack than it can hold, potentially allowing an attacker to overwrite adjacent memory and execute arbitrary code or cause a crash. [1]
How can this vulnerability impact me? :
This vulnerability can lead to severe impacts including unauthorized code execution, system crashes, and full compromise of the affected system. Because it affects control systems software, exploitation could disrupt operations, cause denial of service, or allow attackers to gain control over critical equipment. The CVSS score of 7.8 indicates a high level of risk. [1]
What immediate steps should I take to mitigate this vulnerability?
To mitigate the CVE-2026-1361 vulnerability, immediately upgrade ASDA-Soft to version 7.2.2.0 or later, which contains the fix. Additionally, avoid clicking on untrusted internet links or opening unsolicited email attachments. Prevent exposure of control systems and equipment to the internet by placing them behind firewalls and isolating them from business networks. Use secure remote access methods such as VPNs when remote access is necessary. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
The provided resources do not include specific detection methods or commands to identify the CVE-2026-1361 vulnerability on a network or system. The recommended action is to verify the ASDA-Soft version installed and ensure it is updated to version 7.2.2.0 or later, as versions 7.2.0.0 and earlier are vulnerable. General security best practices include monitoring for unusual behavior and restricting exposure of control systems, but no explicit detection commands are provided. [1]