Critical Buffer Overflow in Delta Electronics AS320T PLC

Critical Buffer Overflow in Delta Electronics AS320T PLC

The National Vulnerability Database has issued a critical alert for CVE-2026-1951, impacting Delta Electronics AS320T programmable logic controllers (PLCs). This vulnerability, with a CVSS score of 9.8 (CRITICAL), stems from a lack of buffer length checking when handling directory names. Specifically, it’s categorized under CWE-121 (Stack-based Buffer Overflow).

This flaw allows an unauthenticated attacker to remotely execute arbitrary code on affected devices. The absence of length validation for directory names means a specially crafted input can overwrite adjacent memory, leading to system compromise. This isn’t just a denial-of-service risk; it’s full control over industrial control systems.

For defenders, this means potential compromise of operational technology (OT) environments. An attacker exploiting this could disrupt critical infrastructure, manipulate industrial processes, or establish persistent access within a facility. The implications for manufacturing, utilities, and other sectors relying on Delta PLCs are severe.

What This Means For You

  • If your organization uses Delta Electronics AS320T PLCs, you need to identify them immediately. This isn't theoretical – a critical, unauthenticated remote code execution vulnerability means these devices are wide open to sophisticated attackers. Isolate these systems from public networks, apply vendor patches as soon as they're available, and implement strict network segmentation to limit blast radius. Audit access logs for any unusual activity.
🛡️ Am I exposed to this? Get detection rules for CVE-2026-1951 — Splunk, Sentinel, Elastic, QRadar & more

Related ATT&CK Techniques

🛡️ Detection Rules

1 rule · 6 SIEM formats

1 detection rule auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

critical T1190 Initial Access

CVE-2026-1951 - Delta AS320T PLC Directory Traversal Buffer Overflow Attempt

Sigma YAML — free preview
✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-1951 Buffer Overflow Delta Electronics AS320T
CVE-2026-1951 Buffer Overflow No checking of the length of the buffer with the directory name
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedApril 24, 2026 at 10:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related Posts

CVE-2026-4078 — Cross-Site Scripting (XSS)

CVE-2026-4078 — The ITERAS plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple shortcodes (iteras-ordering, iteras-signup, iteras-paywall-login, iteras-selfservice) in all versions up to...

vulnerabilityCVEmedium-severitycross-site-scripting-xsscwe-79
/SCW Vulnerability Desk /MEDIUM /6.4 /⚑ 2 IOCs /⚙ 3 Sigma

CVE-2026-3569 — The Liaison Site Prober plugin for WordPress is vulnerable

CVE-2026-3569 — The Liaison Site Prober plugin for WordPress is vulnerable to Information Exposure in all versions up to and including 1.2.1 via the /wp-json/site-prober/v1/logs...

vulnerabilityCVEmedium-severitycwe-862
/SCW Vulnerability Desk /MEDIUM /5.3 /⚑ 2 IOCs /⚙ 3 Sigma

CVE-2026-3565 — The Taqnix plugin for WordPress is vulnerable to Cross-Site

CVE-2026-3565 — The Taqnix plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.3. This is due to...

vulnerabilityCVEmedium-severitycwe-352
/SCW Vulnerability Desk /MEDIUM /4.3 /⚑ 2 IOCs /⚙ 2 Sigma