ePrivacy and GPDR Cookie Consent by Cookie Consent
Zilab Remote Console Server 3.2.9 – ‘zrcs’ Unquoted Service Path – Digitalmunition




Exploit/Advisories spider-orange.png

Published on October 16th, 2019 📆 | 5161 Views ⚑

0

Zilab Remote Console Server 3.2.9 – ‘zrcs’ Unquoted Service Path

# Exploit Title : Zilab Remote Console Server 3.2.9 - 'zrcs' Unquoted Service Path
# Date : 2019-10-15
# Exploit Author : Cakes
# Vendor: Zilab Software Inc
# Version : Zilab Remote Console Server 3.2.9
# Software: http://html.tucows.com/preview/340137/Zilab-Remote-Console-Server?q=remote+support
# Tested on Windows 10
# CVE : N/A 


C:UsersAdministrator>sc qc zrcs
[SC] QueryServiceConfig SUCCESS

SERVICE_NAME: zrcs
        TYPE               : 10  WIN32_OWN_PROCESS
        START_TYPE         : 2   AUTO_START
        ERROR_CONTROL      : 0   IGNORE
        BINARY_PATH_NAME   : C:Program Files (x86)ZilabZRCSZRCS.exe
        LOAD_ORDER_GROUP   :
        TAG                : 0
        DISPLAY_NAME       : Zilab Remote Console Server
        DEPENDENCIES       :
        SERVICE_START_NAME : LocalSystem
            

https://www.exploit-db.com/exploits/47506

Tagged with:



Leave a Reply

Your email address will not be published. Required fields are marked *


loading...