{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreibcrs2uv4gkdr4vwozi4kuzcrvkoahdyvaq2z4yylisixqw7sfv5e",
    "uri": "at://did:plc:6wtxqaikjf62unmnajbfbq5v/app.bsky.feed.post/3mlv54rcxckz2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreie44xwlgvens5igfyfre4a6i2xvvq2nyamp4u5x44cjlee677vj7m"
    },
    "mimeType": "image/webp",
    "size": 17276
  },
  "path": "/critical-canon-mailsuite-vulnerability-enables-remote-code-execution-attacks/",
  "publishedAt": "2026-05-14T18:57:55.000Z",
  "site": "https://vpncentral.com",
  "tags": [
    "News",
    "Critical Canon MailSuite Vulnerability Enables Remote Code Execution Attacks",
    "VPN Central"
  ],
  "textContent": "Canon Marketing Japan has disclosed a critical vulnerability in GUARDIANWALL MailSuite that can let remote attackers execute arbitrary code on affected systems. The flaw, tracked as CVE-2026-32661 and JVN#35567473, affects GUARDIANWALL MailSuite on-premises versions 1.4.00 through 2.4.26. JPCERT/CC says attacks exploiting the vulnerability have already been observed against on-premises deployments. The issue affects the product’s […]\n\nThe post Critical Canon MailSuite Vulnerability Enables Remote Code Execution Attacks appeared first on VPN Central.",
  "title": "Critical Canon MailSuite Vulnerability Enables Remote Code Execution Attacks"
}