ID

VAR-202510-2194


CVE

CVE-2025-62580


TITLE

Delta Electronics ASDA-Soft PAR File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability

Trust: 0.7

sources: ZDI: ZDI-25-976

DESCRIPTION

ASDA-Soft Stack-based Buffer Overflow Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Electronics ASDA-Soft. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PAR files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Delta Electronics ASDA-Soft is an AC servo motor manufactured by Delta Electronics, a Chinese company

Trust: 2.07

sources: NVD: CVE-2025-62580 // ZDI: ZDI-25-976 // CNVD: CNVD-2025-26911

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-26911

AFFECTED PRODUCTS

vendor:deltawwmodel:asda softscope:lteversion:7.0.2.0

Trust: 1.0

vendor:deltamodel:asda-softscope: - version: -

Trust: 0.7

vendor:deltamodel:electronics asda-softscope:lteversion:<=7.0.2.0

Trust: 0.6

sources: ZDI: ZDI-25-976 // CNVD: CNVD-2025-26911 // NVD: CVE-2025-62580

CVSS

SEVERITY

CVSSV2

CVSSV3

759f5e80-c8e1-4224-bead-956d7b33c98b: CVE-2025-62580
value: HIGH

Trust: 1.0

ZDI: CVE-2025-62580
value: HIGH

Trust: 0.7

CNVD: CNVD-2025-26911
value: HIGH

Trust: 0.6

CNVD: CNVD-2025-26911
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

759f5e80-c8e1-4224-bead-956d7b33c98b: CVE-2025-62580
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

ZDI: CVE-2025-62580
baseSeverity: HIGH
baseScore: 7.8
vectorString: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-25-976 // CNVD: CNVD-2025-26911 // NVD: CVE-2025-62580

PROBLEMTYPE DATA

problemtype:CWE-121

Trust: 1.0

sources: NVD: CVE-2025-62580

PATCH

title:Delta Electronics has issued an update to correct this vulnerability.url:https://www.cisa.gov/news-events/ics-advisories/icsa-25-296-04

Trust: 0.7

title:Patch for Delta Electronics ASDA-Soft stack buffer overflow vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/749046

Trust: 0.6

sources: ZDI: ZDI-25-976 // CNVD: CNVD-2025-26911

EXTERNAL IDS

db:NVDid:CVE-2025-62580

Trust: 2.3

db:ZDI_CANid:ZDI-CAN-27128

Trust: 0.7

db:ZDIid:ZDI-25-976

Trust: 0.7

db:CNVDid:CNVD-2025-26911

Trust: 0.6

sources: ZDI: ZDI-25-976 // CNVD: CNVD-2025-26911 // NVD: CVE-2025-62580

REFERENCES

url:https://filecenter.deltaww.com/news/download/doc/delta-pcsa-2025-00019_asda-soft%20stack-based%20buffer%20overflow%20vulnerabilities.pdf

Trust: 1.6

url:https://www.cisa.gov/news-events/ics-advisories/icsa-25-296-04

Trust: 0.7

sources: ZDI: ZDI-25-976 // CNVD: CNVD-2025-26911 // NVD: CVE-2025-62580

CREDITS

Guillaume Orlando

Trust: 0.7

sources: ZDI: ZDI-25-976

SOURCES

db:ZDIid:ZDI-25-976
db:CNVDid:CNVD-2025-26911
db:NVDid:CVE-2025-62580

LAST UPDATE DATE

2025-11-19T23:17:53.633000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-25-976date:2025-10-29T00:00:00
db:CNVDid:CNVD-2025-26911date:2025-11-05T00:00:00
db:NVDid:CVE-2025-62580date:2025-10-28T15:23:20.707

SOURCES RELEASE DATE

db:ZDIid:ZDI-25-976date:2025-10-29T00:00:00
db:CNVDid:CNVD-2025-26911date:2025-11-07T00:00:00
db:NVDid:CVE-2025-62580date:2025-10-16T02:15:33.727