一、 漏洞 CVE-2025-5491 基础信息
漏洞信息
                                        神龙正在分析中.
                                        
提示
尽管我们采用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。
神龙会尽力确保数据准确,但也请结合实际情况进行甄别与判断。
神龙祝您一切顺利!
漏洞标题
Acer ControlCenter - Remote Code Execution
来源:美国国家漏洞数据库 NVD
漏洞描述信息
Acer ControlCenter contains Remote Code Execution vulnerability. The program exposes a Windows Named Pipe that uses a custom protocol to invoke internal functions. However, this Named Pipe is misconfigured, allowing remote users with low privileges to interact with it and access its features. One such feature enables the execution of arbitrary programs as NT AUTHORITY/SYSTEM. By leveraging this, remote attackers can execute arbitrary code on the target system with elevated privileges.
来源:美国国家漏洞数据库 NVD
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
来源:美国国家漏洞数据库 NVD
漏洞类别
特权管理不恰当
来源:美国国家漏洞数据库 NVD
二、漏洞 CVE-2025-5491 的公开POC
# POC 描述 源链接 神龙链接
三、漏洞 CVE-2025-5491 的情报信息
  • 标题: TWCERT/CC台灣電腦網路危機處理暨協調中心|企業資安通報協處|資安情資分享|漏洞通報|資安聯盟|資安電子報-Acer ControlCenter - Remote Code Execution -- 🔗来源链接

    标签: third-party-advisory

  • 标题: TWCERT/CC Taiwan Computer Emergency Response Team/Coordination Center-Acer ControlCenter - Remote Code Execution -- 🔗来源链接

    标签: third-party-advisory

  • 标题: Misconfigured Windows Named Pipe Permissions in ACCSvc.exe allows for Remote Code Execution - Acer Community -- 🔗来源链接

    标签: vendor-advisory

  • https://nvd.nist.gov/vuln/detail/CVE-2025-5491