Risk | High |
Patch available | YES |
Number of vulnerabilities | 12 |
CVE-ID | CVE-2025-47749 CVE-2025-47750 CVE-2025-47751 CVE-2025-47752 CVE-2025-47753 CVE-2025-47754 CVE-2025-47755 CVE-2025-47756 CVE-2025-47757 CVE-2025-47758 CVE-2025-47759 CVE-2025-47760 |
CWE-ID | CWE-761 CWE-787 CWE-125 CWE-121 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Monitouch V-SFT Universal components / Libraries / Software for developers |
Vendor | Fuji Electric |
Security Bulletin
This security bulletin contains information about 12 vulnerabilities.
EUVDB-ID: #VU109670
Risk: High
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2025-47749
CWE-ID:
CWE-761 - Free of Pointer not at Start of Buffer
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to free of pointer not at start of buffer in "VS6EditData.dll!CWinFontInf::WinFontMsgCheck" function. A remote attacker can trick a victim to open a specially crafted V7 or V8 file and execute arbitrary code on the target system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsMonitouch V-SFT: - - 6.2.5.0
CPE2.3https://jvn.jp/en/vu/JVNVU97228144/index.html
https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU109673
Risk: High
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2025-47750
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted input in "VS6MemInIF!set_temp_type_default" function. A remote attacker can create a specially crafted V7 or V8 file, trick the victim into opening it using the affected software, trigger an out-of-bounds write and execute arbitrary code on the target system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsMonitouch V-SFT: - - 6.2.5.0
CPE2.3https://jvn.jp/en/vu/JVNVU97228144/index.html
https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU109676
Risk: High
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2025-47751
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted input in "VS6EditData!CDataRomErrorCheck::MacroCommandCheck" function. A remote attacker can create a specially crafted V7 or V8 file, trick the victim into opening it using the affected software, trigger an out-of-bounds write and execute arbitrary code on the target system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsMonitouch V-SFT: - - 6.2.5.0
CPE2.3https://jvn.jp/en/vu/JVNVU97228144/index.html
https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU109677
Risk: High
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2025-47752
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted input in "VS6ComFile!MakeItemGlidZahyou" function. A remote attacker can create a specially crafted V7 or V8 file, trick the victim into opening it using the affected software, trigger an out-of-bounds write and execute arbitrary code on the target system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsMonitouch V-SFT: - - 6.2.5.0
CPE2.3https://jvn.jp/en/vu/JVNVU97228144/index.html
https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU109689
Risk: High
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2025-47753
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in "VS6EditData!CDrawSLine::GetRectArea" function. A remote attacker can create a specially crafted V7 or V8 file, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system, leading to arbitrary code execution.
MitigationInstall updates from vendor's website.
Vulnerable software versionsMonitouch V-SFT: - - 6.2.5.0
CPE2.3https://jvn.jp/en/vu/JVNVU97228144/index.html
https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU109690
Risk: High
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2025-47754
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in "VS6EditData!Conv_Macro_Data" function. A remote attacker can create a specially crafted V7 or V8 file, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system, leading to arbitrary code execution.
MitigationInstall updates from vendor's website.
Vulnerable software versionsMonitouch V-SFT: - - 6.2.5.0
CPE2.3https://jvn.jp/en/vu/JVNVU97228144/index.html
https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU109691
Risk: High
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2025-47755
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in "VS6EditData!VS4_SaveEnvFile" function. A remote attacker can create a specially crafted V7 or V8 file, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system, leading to arbitrary code execution.
MitigationInstall updates from vendor's website.
Vulnerable software versionsMonitouch V-SFT: - - 6.2.5.0
CPE2.3https://jvn.jp/en/vu/JVNVU97228144/index.html
https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU109692
Risk: High
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2025-47756
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in "VS6EditData!CGamenDataRom::set_mr400_strc" function. A remote attacker can create a specially crafted V7 or V8 file, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system, leading to arbitrary code execution.
MitigationInstall updates from vendor's website.
Vulnerable software versionsMonitouch V-SFT: - - 6.2.5.0
CPE2.3https://jvn.jp/en/vu/JVNVU97228144/index.html
https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU109693
Risk: High
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2025-47757
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in "VS6MemInIF.dll!set_plc_type_default" function. A remote attacker can create a specially crafted V7 or V8 file, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system, leading to arbitrary code execution.
MitigationInstall updates from vendor's website.
Vulnerable software versionsMonitouch V-SFT: - - 6.2.5.0
CPE2.3https://jvn.jp/en/vu/JVNVU97228144/index.html
https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU109694
Risk: High
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2025-47758
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in the "VS6File!CTxSubFile::get_ProgramFile_name" function. A remote unauthenticated attacker can trick a victim to open a specially crafted V7 or V8 file, trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsMonitouch V-SFT: - - 6.2.5.0
CPE2.3https://jvn.jp/en/vu/JVNVU97228144/index.html
https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU109695
Risk: High
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2025-47759
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in the "VS6ComFile!CV7BaseMap::WriteV7DataToRom" function. A remote unauthenticated attacker can trick a victim to open a specially crafted V7 or V8 file, trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsMonitouch V-SFT: - - 6.2.5.0
CPE2.3https://jvn.jp/en/vu/JVNVU97228144/index.html
https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU109696
Risk: High
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2025-47760
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in the "VS6MemInIF!set_temp_type_default" function. A remote unauthenticated attacker can trick a victim to open a specially crafted V7 or V8 file, trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsMonitouch V-SFT: - - 6.2.5.0
CPE2.3https://jvn.jp/en/vu/JVNVU97228144/index.html
https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.