CVE-2026-3630
Received Received - Intake
Stack-Based Buffer Overflow in Delta Electronics COMMGR

Publication date: 2026-03-09

Last updated on: 2026-03-10

Assigner: Deltaww

Description
Delta Electronics COMMGR2 has Stack-based Buffer Overflow vulnerability.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-09
Last Modified
2026-03-10
Generated
2026-05-07
AI Q&A
2026-03-09
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
deltaww commgr2 to 2.11.1 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-787 The product writes data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

This vulnerability has a very high severity with a CVSS v3.1 base score of 9.8, indicating it can be exploited remotely without any privileges or user interaction. Successful exploitation can lead to complete compromise of the affected system, including full confidentiality, integrity, and availability impacts.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Can you explain this vulnerability to me?

This vulnerability is a stack-based buffer overflow found in Delta Electronics COMMGR2. A stack-based buffer overflow occurs when more data is written to a buffer located on the stack than it can hold, which can overwrite adjacent memory and potentially allow an attacker to execute arbitrary code.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart