{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreibcrs2uv4gkdr4vwozi4kuzcrvkoahdyvaq2z4yylisixqw7sfv5e",
"uri": "at://did:plc:6wtxqaikjf62unmnajbfbq5v/app.bsky.feed.post/3mlv54rcxckz2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreie44xwlgvens5igfyfre4a6i2xvvq2nyamp4u5x44cjlee677vj7m"
},
"mimeType": "image/webp",
"size": 17276
},
"path": "/critical-canon-mailsuite-vulnerability-enables-remote-code-execution-attacks/",
"publishedAt": "2026-05-14T18:57:55.000Z",
"site": "https://vpncentral.com",
"tags": [
"News",
"Critical Canon MailSuite Vulnerability Enables Remote Code Execution Attacks",
"VPN Central"
],
"textContent": "Canon Marketing Japan has disclosed a critical vulnerability in GUARDIANWALL MailSuite that can let remote attackers execute arbitrary code on affected systems. The flaw, tracked as CVE-2026-32661 and JVN#35567473, affects GUARDIANWALL MailSuite on-premises versions 1.4.00 through 2.4.26. JPCERT/CC says attacks exploiting the vulnerability have already been observed against on-premises deployments. The issue affects the product’s […]\n\nThe post Critical Canon MailSuite Vulnerability Enables Remote Code Execution Attacks appeared first on VPN Central.",
"title": "Critical Canon MailSuite Vulnerability Enables Remote Code Execution Attacks"
}