Share
## https://sploitus.com/exploit?id=PACKETSTORM:181913
====================================  
CVE ID: CVE-2024-45874  
Author: Iulian Florea  
Vendor: VegaBird  
Product: Vooki - Dynamic Web Application & REST API Vulnerability Scanner (DAST Tool)  
Vulnerability Type: DLL Hijacking  
====================================  
  
  
====================================  
Summary  
====================================  
A DLL hijacking vulnerability in VegaBird Vooki 5.2.9 allows attackers to execute arbitrary code / maintain persistence via placing a crafted DLL file in the same directory as Yaazhini.exe.  
  
====================================  
Exploitation  
====================================  
By placing an arbitrary DLL (Example: dcomp.dll) within the application folder (C:\Program Files\Vooki) and opening the application (Vooki.exe) it can be noted that the DLL is being loaded. This can lead to persistence or in some cases to privilege escalation.