Home

Description

Dynojet Power Core 2.3.0 contains an unquoted service path vulnerability in the DJ.UpdateService that allows local authenticated users to potentially execute code with elevated privileges. Attackers can exploit the unquoted binary path by placing malicious executables in the service's file path to gain Local System access.

PUBLISHED Reserved 2026-01-14 | Published 2026-01-15 | Updated 2026-01-15 | Assigner VulnCheck




HIGH: 8.5CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
HIGH: 7.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

Unquoted Search Path or Element

Product status

2.3.0 (Build 303)
affected

Credits

Pedro Sousa Rodrigues finder

References

www.exploit-db.com/exploits/50466 exploit

www.exploit-db.com/exploits/50466 (ExploitDB-50466) exploit

www.dynojet.com/ (Official Vendor Homepage) product

cve.org (CVE-2021-47773)

nvd.nist.gov (CVE-2021-47773)

Download JSON