is vulnerable to a stack-based buffer overflow, which could allow an attacker to execute arbitrary code.
Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
Fuji Electric recommends users update the product to Monitouch V-SFT v6.2.3.0 https://felib.fujielectric.co.jp/en/M10009/M20104/document_detail/55ff739b-bd06-4241-b078-3b9c9728bdfd .
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-34673 | Fuji Electric Monitouch V-SFT is vulnerable to a stack-based buffer overflow, which could allow an attacker to execute arbitrary code. |
Wed, 30 Jul 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fujielectric
Fujielectric monitouch V-sft |
|
| CPEs | cpe:2.3:a:fujielectric:monitouch_v-sft:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Fujielectric
Fujielectric monitouch V-sft |
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-08-02T02:51:09.599Z
Reserved: 2024-05-20T14:11:06.275Z
Link: CVE-2024-34171
Updated: 2024-08-02T02:51:09.599Z
Status : Analyzed
Published: 2024-05-30T20:15:09.197
Modified: 2025-07-30T19:23:07.310
Link: CVE-2024-34171
No data.
OpenCVE Enrichment
No data.
EUVD