Gallery

Contacts

411 University St, Seattle, USA

engitech@oceanthemes.net

+1 -800-456-478-23

A critical, actively exploited stack-based buffer overflow in Canon Marketing Japan’s GUARDIANWALL MailSuite and its cloud-hosted SaaS variant allows an unauthenticated remote attacker to execute arbitrary code without any credentials. The vulnerability is confirmed on the CISA Known Exploited Vulnerabilities catalog, indicating real-world active exploitation. Organizations running GUARDIANWALL for email security face immediate risk of full system compromise on the affected mail gateway component.

Author

Tech Jacks Solutions