EUVD-2025-16846

| CVE-2025-47727 HIGH
2025-06-04 759f5e80-c8e1-4224-bead-956d7b33c98b
7.3
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 14, 2026 - 17:29 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 17:29 euvd
EUVD-2025-16846
CVE Published
Jun 04, 2025 - 08:15 nvd
HIGH 7.3

DescriptionNVD

Delta Electronics CNCSoft lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.

AnalysisAI

Local code execution vulnerability in Delta Electronics CNCSoft caused by insufficient validation of user-supplied files. When a user opens a malicious file, an attacker can execute arbitrary code with the privileges of the current process. While no publicly disclosed POC or active exploitation in the wild has been confirmed, the high CVSS score (7.3) and the file-opening attack vector present moderate risk to users of affected CNCSoft versions.

Technical ContextAI

The vulnerability exists in Delta Electronics CNCSoft, a computer numerical control (CNC) software suite used for industrial automation and machine control. The root cause is classified as CWE-787 (Out-of-bounds Write), indicating that the file parser lacks proper bounds checking or validation when processing user-supplied input files. This improper validation allows an attacker to craft a malicious file (likely in a format expected by CNCSoft such as G-code, CAM output, or proprietary configuration formats) that triggers an out-of-bounds write condition. When processed by the vulnerable application, this write can corrupt memory and redirect control flow to attacker-supplied code, enabling arbitrary code execution within the context of the CNCSoft process.

RemediationAI

  1. Patch immediately upon availability: Contact Delta Electronics or monitor their official security advisories for a patched version of CNCSoft. 2. Interim mitigations (if patching is delayed): Restrict file-opening permissions to trusted users only; disable CNCSoft functionality where not essential; educate users to avoid opening files from untrusted sources. 3. File handling controls: Implement application whitelisting or sandboxing for CNCSoft to limit code execution context. 4. Monitor vendor advisory: Check Delta Electronics' security center or contact their support channel for CVE-2025-47727 patch release information and guidance. 5. Network segmentation: Isolate CNC systems from general IT networks where possible to reduce lateral movement risk if exploitation occurs.

Share

EUVD-2025-16846 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy