Impact
NETGATE Registry Cleaner build 16.0.205 suffers from an unquoted service path flaw (CWE-428) in the NGRegClnSrv service. The vulnerability permits a local actor to place a malicious executable in the unquoted binary path and trigger a service restart or system reboot, causing the exploit to run with LocalSystem privileges. This grants the attacker full control over the affected Windows system, enabling arbitrary code execution, configuration changes, or further lateral movement.
Affected Systems
The affected product is Netgate Registry Cleaner version 16.0.205. No other builds are listed as vulnerable, and earlier or later releases have no reported issues in the available data.
Risk and Exploitability
The vulnerability carries a CVSS score of 8.5, indicating high severity. No EPSS score is available, and it is not listed in CISA's KEV catalog. The attack vector is inferred to be local: an attacker must have the ability to write to the service directory and force a restart or reboot. While remote exploitation is not supported by the description, the apparent local requirement means that physical or logged-in user access can lead to a complete system compromise.
OpenCVE Enrichment