Cyber Posture

CVE-2026-5726

High

Published: 08 April 2026

Published
08 April 2026
Modified
13 April 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0001 0.8th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-5726 is a high-severity Stack-based Buffer Overflow (CWE-121) vulnerability in Deltaww Asda Soft. Its CVSS base score is 7.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 0.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Flaw remediation directly addresses the stack-based buffer overflow in ASDA-Soft by identifying, patching, and verifying fixes for this specific CVE.

prevent

Memory protection mechanisms such as stack canaries, ASLR, and DEP comprehensively mitigate exploitation of stack-based buffer overflows.

prevent

Information input validation prevents the malformed inputs that trigger the out-of-bounds write in ASDA-Soft's stack buffer overflow.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1204.002 Malicious File Execution
An adversary may rely upon a user opening a malicious file in order to gain execution.
Why these techniques?

Local stack-based buffer overflow requiring user interaction (likely malicious file) enables client-side code execution via exploitation (T1203) and user execution (T1204.002).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

ASDA-Soft Stack-based Buffer Overflow Vulnerability

Deeper analysisAI

CVE-2026-5726 is a stack-based buffer overflow vulnerability in ASDA-Soft, published on 2026-04-08. It corresponds to CWEs-121 (stack-based buffer overflow) and CWE-787 (out-of-bounds write), with a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).

A local attacker can exploit this vulnerability with low attack complexity and no required privileges by tricking a user into some interaction. Successful exploitation enables high-impact consequences, including unauthorized disclosure of information, modification of data, and denial of service.

Delta's advisory PCSA-2026-00007 addresses this ASDA-Soft stack-based buffer overflow vulnerability (CVE-2026-5726), with details available at https://filecenter.deltaww.com/news/download/doc/Delta-PCSA-2026-00007_ASDA-Soft%20Stack-based%20Buffer%20Overflow%20Vulnerability%20(CVE-2026-5726).pdf.

Details

CWE(s)

Affected Products

deltaww
asda soft
≤ 7.2.6.0

CVEs Like This One

CVE-2026-1361Same product: Deltaww Asda Soft
CVE-2026-3094Same vendor: Deltaww
CVE-2025-22881Same vendor: Deltaww
CVE-2026-0975Same vendor: Deltaww
CVE-2026-33491Shared CWE-121, CWE-787
CVE-2026-3630Same vendor: Deltaww
CVE-2025-27168Shared CWE-121, CWE-787
CVE-2025-22880Same vendor: Deltaww
CVE-2025-21163Shared CWE-121, CWE-787
CVE-2026-30987Shared CWE-121, CWE-787

References