Nov. 27, 2023, 6 a.m. |

ZDI: Published Advisories www.zerodayinitiative.com

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Tellus Lite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-35127.

arbitrary code attackers buffer buffer overflow code code execution electric exploit file fuji fuji electric malicious overflow page parsing remote code remote code execution simulator stack target vulnerability zdi

More from www.zerodayinitiative.com / ZDI: Published Advisories

Senior PAM Security Engineer

@ Experian | Hyderabad, India

Cybersecurity Analyst II

@ Spry Methods | Washington, DC (Hybrid)

Cyber Security Engineer

@ Expleo | Gothenburg, AC, Sweden

Cybersecurity – Information System Security Manager (ISSM)

@ Boeing | USA - Albuquerque, NM

Senior Security Engineer - Canada

@ DataVisor | Ontario, Canada - Remote

Cybersecurity Architect

@ HARMAN International | JP Tokyo 3-5-7 Ariake Koto-ku