CVE-2026-3630
Received Received - Intake
Stack-Based Buffer Overflow in Delta Electronics COMMGR

Publication date: 2026-03-09

Last updated on: 2026-03-10

Assigner: Deltaww

Description
Delta Electronics COMMGR2 has Stack-based Buffer Overflow vulnerability.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Affected Vendors & Products
Vendor Product Version
deltaww commgr2 to 2.11.1 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-787 The product writes data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

This vulnerability has a very high severity with a CVSS v3.1 base score of 9.8, indicating it can be exploited remotely without any privileges or user interaction. Successful exploitation can lead to complete compromise of the affected system, including full confidentiality, integrity, and availability impacts.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Can you explain this vulnerability to me?

This vulnerability is a stack-based buffer overflow found in Delta Electronics COMMGR2. A stack-based buffer overflow occurs when more data is written to a buffer located on the stack than it can hold, which can overwrite adjacent memory and potentially allow an attacker to execute arbitrary code.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart
Meta Information
CVE Publication Date:
2026-03-09
CVE Last Modified Date:
2026-03-10
Report Generation Date:
2026-03-10
AI Powered Q&A Generation:
2026-03-09
EPSS Last Evaluated Date:
2026-03-09
NVD Report Link: