Impact
This vulnerability stems from insecure file permissions that allow an unprivileged user to modify executable files within the ZKTimeNet3.0 directory. By replacing the original binaries with malicious ones, an attacker can obtain elevated privileges. The weakness aligns with CWE‑538, a high‑severity flaw that directly enables privilege escalation.
Affected Systems
ZKTeco Inc. delivers the ZKTeco ZKTime.Net product, and the affected version is 3.0.1.6. The issue resides in the ZKTimeNet3.0 directory, which is world‑writable and contains executable files that can be altered by non‑privileged users.
Risk and Exploitability
The CVSS score of 9.3 denotes severe risk while the EPSS score of less than 1% indicates a low probability of exploitation. This vulnerability is not listed in CISA's Known Exploited Vulnerabilities catalog. An attacker would need local access to the system and can exploit the world‑writable permission on the service directory to replace binaries, thereby gaining system‑wide administrative rights.
OpenCVE Enrichment