Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-11802: CWE-121: Stack-based Buffer Overflow in Fuji Electric Tellus Lite

0
High
VulnerabilityCVE-2024-11802cvecve-2024-11802cwe-121
Published: Wed Nov 27 2024 (11/27/2024, 23:35:12 UTC)
Source: CVE Database V5
Vendor/Project: Fuji Electric
Product: Tellus Lite

Description

CVE-2024-11802 is a high-severity stack-based buffer overflow vulnerability in Fuji Electric Tellus Lite V-Simulator 5 version 4. 0. 20. 0. It arises from improper validation of user-supplied V8 file data length before copying into a fixed-length stack buffer. Exploitation requires user interaction, such as opening a malicious file or visiting a crafted webpage, enabling remote code execution with the privileges of the current process. The vulnerability impacts confidentiality, integrity, and availability, allowing attackers to execute arbitrary code remotely. No known exploits are currently reported in the wild. Organizations using Fuji Electric Tellus Lite should prioritize patching or mitigating this flaw to prevent potential compromise. The vulnerability is rated with a CVSS score of 7.

AI-Powered Analysis

AILast updated: 02/26/2026, 05:27:20 UTC

Technical Analysis

CVE-2024-11802 is a stack-based buffer overflow vulnerability identified in Fuji Electric Tellus Lite V-Simulator 5, specifically version 4.0.20.0. The flaw exists in the parsing logic of V8 files, where the software fails to properly validate the length of user-supplied data before copying it into a fixed-size stack buffer. This lack of bounds checking can lead to a buffer overflow condition, which an attacker can exploit to overwrite the stack memory, potentially injecting and executing arbitrary code within the context of the vulnerable process. The vulnerability requires user interaction, such as opening a maliciously crafted V8 file or visiting a malicious webpage that triggers the vulnerable parsing routine. The CVSS 3.0 base score of 7.8 reflects the vulnerability's high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required, but user interaction necessary. The vulnerability was reported by the Zero Day Initiative (ZDI) under identifier ZDI-CAN-24770 and is categorized under CWE-121 (Stack-based Buffer Overflow). No patches or exploits in the wild have been reported at the time of publication, but the potential for remote code execution makes this a critical concern for affected users. Fuji Electric Tellus Lite is used in industrial automation and energy management systems, making this vulnerability particularly relevant to critical infrastructure environments.

Potential Impact

The impact of CVE-2024-11802 is significant, as successful exploitation allows remote attackers to execute arbitrary code with the privileges of the Tellus Lite process. This can lead to full system compromise, including unauthorized access to sensitive operational data, disruption of industrial control processes, and potential sabotage of critical infrastructure. The vulnerability affects confidentiality by enabling data theft or espionage, integrity by allowing manipulation of system operations or data, and availability by potentially causing system crashes or denial of service. Given the industrial and energy sector usage of Fuji Electric Tellus Lite, exploitation could have cascading effects on production lines, energy distribution, and safety systems. The requirement for user interaction somewhat limits the attack vector but does not eliminate risk, especially in environments where users may open files from untrusted sources or visit compromised websites. The absence of known exploits in the wild currently reduces immediate risk but does not preclude future attacks, making proactive mitigation essential.

Mitigation Recommendations

To mitigate CVE-2024-11802, organizations should first verify if they are running Fuji Electric Tellus Lite V-Simulator 5 version 4.0.20.0 and prioritize upgrading to a patched version once available. In the absence of an official patch, implement strict file handling policies to restrict the opening of untrusted V8 files and disable or limit the use of the V-Simulator 5 component where feasible. Employ network segmentation to isolate critical industrial systems from general user networks and the internet to reduce exposure. Enhance endpoint protection with behavior-based detection to identify anomalous activities related to buffer overflow exploitation attempts. Conduct user awareness training emphasizing the risks of opening files from untrusted sources and visiting suspicious websites. Monitor logs and network traffic for unusual activity indicative of exploitation attempts. Collaborate with Fuji Electric support channels for updates and advisories. Finally, consider application whitelisting to prevent unauthorized execution of code within the Tellus Lite environment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2024-11-26T16:02:48.337Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 699f6e20b7ef31ef0b59665c

Added to database: 2/25/2026, 9:48:16 PM

Last enriched: 2/26/2026, 5:27:20 AM

Last updated: 2/26/2026, 10:04:09 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats