Description
WIN-PACK PRO 4.8 contains an unquoted service path vulnerability in the WPCommandFileService that allows local users to potentially execute code with elevated privileges. Attackers can exploit the unquoted path in C:\Program Files <x86>\WINPAKPRO\WPCommandFileService Service.exe to inject malicious code that would execute with LocalSystem permissions.
Problem types
Unquoted Search Path or Element
Product status
Credits
Alan Mondragon
References
www.exploit-db.com/exploits/49692 (ExploitDB-49692)
www.security.honeywell.com/product-repository/winpak (Honeywell Product Webpage)
www.vulncheck.com/...ommandfileservice-unquoted-service-path (VulnCheck Advisory: WIN-PACK PRO 4.8 - 'WPCommandFileService' Unquoted Service Path)