github.com/cloudflare/cloudflared is vulnerable to privilege escalation. The way cloudflared reads its configuration file from C:\etc
as default directory allows setting of an attacker-controlled log file location via malformed config.yaml file to escalate privileges and execute system-level commands.