Medium
An attacker could use a specially crafted project file to overflow the buffer and execute code under the privileges of the application.
Privilege access
EZAutomation
EZ Touch Editor
EZAutomation recommends users update to Version 2.2.0 or later.