We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-5491

Acer ControlCenter - Remote Code Execution



Description

Acer ControlCenter contains Remote Code Execution vulnerability. The program exposes a Windows Named Pipe that uses a custom protocol to invoke internal functions. However, this Named Pipe is misconfigured, allowing remote users with low privileges to interact with it and access its features. One such feature enables the execution of arbitrary programs as NT AUTHORITY/SYSTEM. By leveraging this, remote attackers can execute arbitrary code on the target system with elevated privileges.

Reserved 2025-06-03 | Published 2025-06-13 | Updated 2025-06-13 | Assigner twcert


HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-269 Improper Privilege Management

Product status

Default status
unaffected

4.00.3000
affected

Credits

Orange Cyberdefense reporter

References

www.twcert.org.tw/tw/cp-132-10180-36818-1.html third-party-advisory

www.twcert.org.tw/en/cp-139-10181-933ae-2.html third-party-advisory

community.acer.com/...=organic-search&utm_term=Vulnerability vendor-advisory

cve.org (CVE-2025-5491)

nvd.nist.gov (CVE-2025-5491)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-5491

Support options

Helpdesk Chat, Email, Knowledgebase