Multiple vulnerabilities in Fuji Electric V-SFT



Risk High
Patch available YES
Number of vulnerabilities 12
CVE-ID CVE-2025-47749
CVE-2025-47750
CVE-2025-47751
CVE-2025-47752
CVE-2025-47753
CVE-2025-47754
CVE-2025-47755
CVE-2025-47756
CVE-2025-47757
CVE-2025-47758
CVE-2025-47759
CVE-2025-47760
CWE-ID CWE-761
CWE-787
CWE-125
CWE-121
Exploitation vector Network
Public exploit N/A
Vulnerable software
Monitouch V-SFT
Universal components / Libraries / Software for developers

Vendor Fuji Electric

Security Bulletin

This security bulletin contains information about 12 vulnerabilities.

1) Free of Pointer not at Start of Buffer

EUVDB-ID: #VU109670

Risk: High

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2025-47749

CWE-ID: CWE-761 - Free of Pointer not at Start of Buffer

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to free of pointer not at start of buffer in "VS6EditData.dll!CWinFontInf::WinFontMsgCheck" function. A remote attacker can trick a victim to open a specially crafted V7 or V8 file and execute arbitrary code on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Monitouch V-SFT: - - 6.2.5.0

CPE2.3 External links

https://jvn.jp/en/vu/JVNVU97228144/index.html
https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Out-of-bounds write

EUVDB-ID: #VU109673

Risk: High

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2025-47750

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input in "VS6MemInIF!set_temp_type_default" function. A remote attacker can create a specially crafted V7 or V8 file, trick the victim into opening it using the affected software, trigger an out-of-bounds write and execute arbitrary code on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Monitouch V-SFT: - - 6.2.5.0

CPE2.3 External links

https://jvn.jp/en/vu/JVNVU97228144/index.html
https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Out-of-bounds write

EUVDB-ID: #VU109676

Risk: High

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2025-47751

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input in "VS6EditData!CDataRomErrorCheck::MacroCommandCheck" function. A remote attacker can create a specially crafted V7 or V8 file, trick the victim into opening it using the affected software, trigger an out-of-bounds write and execute arbitrary code on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Monitouch V-SFT: - - 6.2.5.0

CPE2.3 External links

https://jvn.jp/en/vu/JVNVU97228144/index.html
https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Out-of-bounds write

EUVDB-ID: #VU109677

Risk: High

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2025-47752

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input in "VS6ComFile!MakeItemGlidZahyou" function. A remote attacker can create a specially crafted V7 or V8 file, trick the victim into opening it using the affected software, trigger an out-of-bounds write and execute arbitrary code on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Monitouch V-SFT: - - 6.2.5.0

CPE2.3 External links

https://jvn.jp/en/vu/JVNVU97228144/index.html
https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Out-of-bounds read

EUVDB-ID: #VU109689

Risk: High

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2025-47753

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in "VS6EditData!CDrawSLine::GetRectArea" function. A remote attacker can create a specially crafted V7 or V8 file, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system, leading to arbitrary code execution.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Monitouch V-SFT: - - 6.2.5.0

CPE2.3 External links

https://jvn.jp/en/vu/JVNVU97228144/index.html
https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Out-of-bounds read

EUVDB-ID: #VU109690

Risk: High

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2025-47754

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in "VS6EditData!Conv_Macro_Data" function. A remote attacker can create a specially crafted V7 or V8 file, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system, leading to arbitrary code execution.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Monitouch V-SFT: - - 6.2.5.0

CPE2.3 External links

https://jvn.jp/en/vu/JVNVU97228144/index.html
https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Out-of-bounds read

EUVDB-ID: #VU109691

Risk: High

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2025-47755

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in "VS6EditData!VS4_SaveEnvFile" function. A remote attacker can create a specially crafted V7 or V8 file, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system, leading to arbitrary code execution.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Monitouch V-SFT: - - 6.2.5.0

CPE2.3 External links

https://jvn.jp/en/vu/JVNVU97228144/index.html
https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Out-of-bounds read

EUVDB-ID: #VU109692

Risk: High

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2025-47756

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in "VS6EditData!CGamenDataRom::set_mr400_strc" function. A remote attacker can create a specially crafted V7 or V8 file, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system, leading to arbitrary code execution.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Monitouch V-SFT: - - 6.2.5.0

CPE2.3 External links

https://jvn.jp/en/vu/JVNVU97228144/index.html
https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Out-of-bounds read

EUVDB-ID: #VU109693

Risk: High

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2025-47757

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in "VS6MemInIF.dll!set_plc_type_default" function. A remote attacker can create a specially crafted V7 or V8 file, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system, leading to arbitrary code execution.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Monitouch V-SFT: - - 6.2.5.0

CPE2.3 External links

https://jvn.jp/en/vu/JVNVU97228144/index.html
https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Stack-based buffer overflow

EUVDB-ID: #VU109694

Risk: High

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2025-47758

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the "VS6File!CTxSubFile::get_ProgramFile_name" function. A remote unauthenticated attacker can trick a victim to open a specially crafted V7 or V8 file, trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Monitouch V-SFT: - - 6.2.5.0

CPE2.3 External links

https://jvn.jp/en/vu/JVNVU97228144/index.html
https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Stack-based buffer overflow

EUVDB-ID: #VU109695

Risk: High

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2025-47759

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the "VS6ComFile!CV7BaseMap::WriteV7DataToRom" function. A remote unauthenticated attacker can trick a victim to open a specially crafted V7 or V8 file, trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Monitouch V-SFT: - - 6.2.5.0

CPE2.3 External links

https://jvn.jp/en/vu/JVNVU97228144/index.html
https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Stack-based buffer overflow

EUVDB-ID: #VU109696

Risk: High

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2025-47760

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the "VS6MemInIF!set_temp_type_default" function. A remote unauthenticated attacker can trick a victim to open a specially crafted V7 or V8 file, trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Monitouch V-SFT: - - 6.2.5.0

CPE2.3 External links

https://jvn.jp/en/vu/JVNVU97228144/index.html
https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###