header-logo
Suggest Exploit
vendor:
Zilab Remote Console Server
by:
Cakes
7.5
CVSS
HIGH
Unquoted Service Path
428
CWE
Product Name: Zilab Remote Console Server
Affected Version From: 3.2.2009
Affected Version To: 3.2.2009
Patch Exists: NO
Related CWE:
CPE: a:zilab_software_inc:zilab_remote_console_server:3.2.9
Metasploit:
Other Scripts:
Platforms Tested: Windows 10
2019

Zilab Remote Console Server 3.2.9 – ‘zrcs’ Unquoted Service Path

The Zilab Remote Console Server 3.2.9 software installs a service called 'zrcs' with an unquoted service path. This vulnerability can allow an attacker to escalate privileges and execute arbitrary code.

Mitigation:

To mitigate this vulnerability, the vendor should update the software to include a properly quoted service path. Users can also manually edit the service path in the Windows Service Manager to include quotes around the path.
Source

Exploit-DB raw data:

# Exploit Title : Zilab Remote Console Server 3.2.9 - 'zrcs' Unquoted Service Path
# Date : 2019-10-15
# Exploit Author : Cakes
# Vendor: Zilab Software Inc
# Version : Zilab Remote Console Server 3.2.9
# Software: http://html.tucows.com/preview/340137/Zilab-Remote-Console-Server?q=remote+support
# Tested on Windows 10
# CVE : N/A 


C:\Users\Administrator>sc qc zrcs
[SC] QueryServiceConfig SUCCESS

SERVICE_NAME: zrcs
        TYPE               : 10  WIN32_OWN_PROCESS
        START_TYPE         : 2   AUTO_START
        ERROR_CONTROL      : 0   IGNORE
        BINARY_PATH_NAME   : C:\Program Files (x86)\Zilab\ZRCS\ZRCS.exe
        LOAD_ORDER_GROUP   :
        TAG                : 0
        DISPLAY_NAME       : Zilab Remote Console Server
        DEPENDENCIES       :
        SERVICE_START_NAME : LocalSystem