Description
VeeVPN 1.6.1 contains an unquoted service path vulnerability in the VeePNService that allows remote attackers to execute code during startup or reboot with escalated privileges. Attackers can exploit this by providing a malicious service name, allowing them to inject commands and run as LocalSystem.
Problem types
CWE-428 Unquoted Search Path or Element
Product status
1.6.1
Credits
Doöukan Orhan, Örhan.dogukan@gmail.com
References
www.exploit-db.com/exploits/52088
www.exploit-db.com/exploits/52088 (ExploitDB-52088)
veepn.com/ (VeePN Homepage)
github.com/veepn/veepn (VeePN GitHub Repository)
www.vulncheck.com/...oted-service-path-remote-code-execution