Delta Electronics AS320T has
No checking of the length of the buffer with the file name vulnerability.
Delta Electronics AS320T has
No checking of the length of the buffer with the file name vulnerability.
<= 1.14 - AFFECTED
Delta Electronics AS320T has No checking of the length of the buffer with the file name...
https://github.com/advisories/GHSA-wv29-5pf5-8fp6Delta Electronics AS320T has No checking of the length of the buffer with the file name vulnerability.
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2026-1950",
"assignerOrgId": "759f5e80-c8e1-4224-bead-956d7b33c98b",
"assignerShortName": "Deltaww",
"dateUpdated": "2026-04-24T06:00:06.239Z",
"dateReserved": "2026-02-05T05:43:00.436Z",
"datePublished": "2026-04-24T05:56:52.385Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "759f5e80-c8e1-4224-bead-956d7b33c98b",
"shortName": "Deltaww",
"dateUpdated": "2026-04-24T06:00:06.239Z"
},
"datePublic": "2026-04-24T05:26:00.000Z",
"title": "No checking of the length of the buffer with the file name in AS320T",
"descriptions": [
{
"lang": "en",
"value": "Delta Electronics AS320T has \nNo checking of the length of the buffer with the file name vulnerability.",
"supportingMedia": [
{
"type": "text/html",
"base64": false,
"value": "Delta Electronics AS320T has \nNo checking of the length of the buffer with the file name vulnerability."
}
]
}
],
"affected": [
{
"vendor": "DeltaWW",
"product": "AS320T",
"defaultStatus": "unaffected",
"versions": [
{
"version": "0",
"status": "affected",
"versionType": "custom",
"lessThanOrEqual": "1.14"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-121 Stack-based Buffer Overflow",
"cweId": "CWE-121",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://filecenter.deltaww.com/news/download/doc/Delta-PCSA-2026-00006_AS320T%20Multiple%20vulnerabilities%20(CVE-2026-1949,%201950,%201951,%201952).pdf"
}
],
"impacts": [
{
"capecId": "CAPEC-100",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-100: Overflow Buffers"
}
]
}
],
"metrics": [
{
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
],
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
}
}
],
"solutions": [
{
"lang": "en",
"value": "Upgrade firmware to v1.16 or later",
"supportingMedia": [
{
"type": "text/html",
"base64": false,
"value": "Upgrade firmware to v1.16 or later<br>"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Sergey Fedonin and Ivan Kurnakov (Positive Technologies)",
"type": "reporter"
}
]
}
}
}