Home

Description

The RealNetworks RealArcade platform includes an ActiveX control (InstallerDlg.dll, version 2.6.0.445) that exposes a method named Exec via the StubbyUtil.ProcessMgr COM object. This method allows remote attackers to execute arbitrary commands on a victim's Windows machine without proper validation or restrictions. This platform was sometimes referred to or otherwise known as RealArcade or Arcade Games and has since consolidated with RealNetworks' platform, GameHouse.

PUBLISHED Reserved 2025-08-19 | Published 2025-08-20 | Updated 2025-08-21 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-623 Unsafe ActiveX Control Marked Safe For Scripting

Product status

Default status
unknown

*
affected

Credits

rgod finder

References

www.exploit-db.com/exploits/17105 exploit

www.exploit-db.com/exploits/17149 exploit

raw.githubusercontent.com/...ser/real_arcade_installerdlg.rb exploit

advisories.checkpoint.com/.../public/2011/cpai-2011-347.html third-party-advisory

www.gamehouse.com/ product

archive.org/details/com.real.arcade product

www.vulncheck.com/...-games-activex-arbitrary-code-execution third-party-advisory

cve.org (CVE-2011-10028)

nvd.nist.gov (CVE-2011-10028)

Download JSON