An attacker could use a specially crafted project file to overflow the buffer and execute code under the privileges of the EZ Touch Editor Versions 2.1.0 and prior.Referenceshttps://www.us-cert.gov/ics/advisories/icsa-19-246-01