Critical Buffer Overflow in Delta Electronics AS320T PLC
The National Vulnerability Database has issued a critical alert for CVE-2026-1951, impacting Delta Electronics AS320T programmable logic controllers (PLCs). This vulnerability, with a CVSS score of 9.8 (CRITICAL), stems from a lack of buffer length checking when handling directory names. Specifically, it’s categorized under CWE-121 (Stack-based Buffer Overflow).
This flaw allows an unauthenticated attacker to remotely execute arbitrary code on affected devices. The absence of length validation for directory names means a specially crafted input can overwrite adjacent memory, leading to system compromise. This isn’t just a denial-of-service risk; it’s full control over industrial control systems.
For defenders, this means potential compromise of operational technology (OT) environments. An attacker exploiting this could disrupt critical infrastructure, manipulate industrial processes, or establish persistent access within a facility. The implications for manufacturing, utilities, and other sectors relying on Delta PLCs are severe.
What This Means For You
- If your organization uses Delta Electronics AS320T PLCs, you need to identify them immediately. This isn't theoretical – a critical, unauthenticated remote code execution vulnerability means these devices are wide open to sophisticated attackers. Isolate these systems from public networks, apply vendor patches as soon as they're available, and implement strict network segmentation to limit blast radius. Audit access logs for any unusual activity.
Related ATT&CK Techniques
🛡️ Detection Rules
1 rule · 6 SIEM formats1 detection rule auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-1951 - Delta AS320T PLC Directory Traversal Buffer Overflow Attempt
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-1951 | Buffer Overflow | Delta Electronics AS320T |
| CVE-2026-1951 | Buffer Overflow | No checking of the length of the buffer with the directory name |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 24, 2026 at 10:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.