Critical Remote Code Execution in Delta Electronics ASDA‑Soft (CVE‑2026‑1361) via PAR File Parsing
What It Is – A stack‑based buffer overflow in the PAR file parser of Delta Electronics’ ASDA‑Soft allows a remote attacker to execute arbitrary code. The flaw (CVE‑2026‑1361) scores 7.8 CVSS (High) and requires the victim to open a malicious PAR file or visit a crafted page.
Exploitability – Public advisory released 16 Mar 2026; no public PoC yet, but the vulnerability is actively exploitable once a malicious file is delivered.
Affected Products – Delta Electronics ASDA‑Soft (all versions prior to the vendor‑issued patch).
TPRM Impact – ASDA‑Soft is often embedded in industrial control and IoT deployments supplied to manufacturers, OEMs, and managed service providers. A successful exploit can compromise downstream customers, create a supply‑chain foothold, and lead to service disruption or data leakage across multiple organizations.
Recommended Actions –
- Patch immediately – Deploy Delta’s security update referenced in the advisory.
- Inventory – Identify all assets running ASDA‑Soft across your vendor ecosystem; prioritize critical production systems.
- Network Segmentation – Restrict inbound traffic to systems that process PAR files; enforce application‑layer filtering.
- User Awareness – Train end‑users and third‑party operators to avoid opening unsolicited PAR files.
- Monitor – Enable IDS/IPS signatures for the known exploit patterns and log any abnormal process launches.