# 艾利思更新服务1.2.3500.0未引用路径漏洞
N/A
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|
标题: Acer Updater Service 1.2.3500.0 - 'UpdaterService.exe' Unquoted Service Path - Windows local Exploit -- 🔗来源链接
标签:exploit
神龙速读:
**关键信息:**
- **漏洞名称:** Acer Updater Service 1.2.3500.0 - 'UpdaterService.exe' Unquoted Service Path
- **EDB-ID:** 49890
- **CVE:** N/A
- **作者:** Emmanuel Lujan
- **类型:** LOCAL
- **平台:** WINDOWS
- **日期:** 2021-05-20
- **漏洞类型:** Unquoted Service Path
- **测试版本:** 1.2.3500.0
- **测试操作系统:** Windows 7 Home Premium x64
**漏洞路径:**
```
C:\Program Files\Acer\Acer Updater\UpdaterService.exe
```
**漏洞描述:**
- 成功利用此漏洞需要本地用户能够在系统根路径中插入其代码,并且在应用启动或重启时执行,从而以应用的特权级别执行代码。
标题: Acer Updater Service 1.2.3500.0 - 'UpdaterService.exe' Unquoted Service Path | Advisories | VulnCheck -- 🔗来源链接
标签:third-party-advisory
神龙速读:
### 关键漏洞信息
- **Advisory Title**: Acer Updater Service 1.2.3500.0 - 'UpdaterService.exe' Unquoted Service Path
- **Severity**: HIGH
- **Date**: January 16, 2026
- **Affected Product**: Acer Updater Service 1.2.3500.0
- **CVE ID**: CVE-2021-47825
- **CWE ID**: CWE-428 Unquoted Search Path or Element
- **CVSS Score**: 5.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
- **Description**:
- The vulnerability allows local users to execute code with elevated system privileges by exploiting the unquoted path in `C:\Program Files\Acer\Acer Updater\` to inject malicious executables run with LocalSystem permissions.
- **References**:
- [ExploitDB-49890](https://example.com/ExploitDB-49890)
- [Acer Official Homepage](https://example.com/Acer)
- **Credit**: Emmanuel Lujan
- **Affected Path**: `C:\Program Files\Acer\Acer Updater\`
暂无评论