{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T04:49:17.682","vulnerabilities":[{"cve":{"id":"CVE-2025-58317","sourceIdentifier":"759f5e80-c8e1-4224-bead-956d7b33c98b","published":"2025-09-24T07:15:40.597","lastModified":"2025-09-25T18:19:30.327","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Delta Electronics CNCSoft-G2 lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process."},{"lang":"es","value":"Delta Electronics CNCSoft-G2 carece de validación adecuada del archivo suministrado por el usuario. Si un usuario abre un archivo malicioso, un atacante puede aprovechar esta vulnerabilidad para ejecutar código en el contexto del proceso actual."}],"metrics":{"cvssMetricV31":[{"source":"759f5e80-c8e1-4224-bead-956d7b33c98b","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"759f5e80-c8e1-4224-bead-956d7b33c98b","type":"Secondary","description":[{"lang":"en","value":"CWE-121"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:deltaww:cncsoft-g2:*:*:*:*:*:*:*:*","versionEndExcluding":"2.1.0.34","matchCriteriaId":"90BE3BD1-B6B3-483D-9DCE-1550ABBD2A40"}]}]}],"references":[{"url":"https://filecenter.deltaww.com/news/download/doc/Delta-PCSA-2025-00017_CNCSoft-G2_File%20Parsing%20Stack-based%20Buffer%20Overflow%20Vulnerability.pdf","source":"759f5e80-c8e1-4224-bead-956d7b33c98b","tags":["Vendor Advisory"]}]}}]}