WECON LeviStudioU Versions 2019-09-21 and prior are vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute code.CreditsNatnael Samson (@NattiSamson), working with Trend Micro’s Zero Day Initiative, reported these vulnerabilities to CISA.Referenceshttps://www.cisa.gov/uscert/ics/advisories/icsa-21-355-03https://www.zerodayinitiative.com/advisories/ZDI-22-133/https://www.zerodayinitiative.com/advisories/ZDI-22-139/https://www.zerodayinitiative.com/advisories/ZDI-22-134/https://www.zerodayinitiative.com/advisories/ZDI-22-136/https://www.zerodayinitiative.com/advisories/ZDI-22-138/https://www.zerodayinitiative.com/advisories/ZDI-22-141/https://www.zerodayinitiative.com/advisories/ZDI-22-137/https://www.zerodayinitiative.com/advisories/ZDI-22-131/https://www.zerodayinitiative.com/advisories/ZDI-22-135/https://www.zerodayinitiative.com/advisories/ZDI-22-142/https://www.zerodayinitiative.com/advisories/ZDI-22-129/https://www.zerodayinitiative.com/advisories/ZDI-22-140/