DLL search order hijacking vulnerability in the wave.exe executable for Windows 11, version 1.27.8. Exploitation of this vulnerability could allow attackers with local access to execute arbitrary code by placing an arbitrary file in the 'C:\Users<user>\AppData\Local\Temp' directory, which could lead to arbitrary code execution and persistence. This vulnerability is only replicable in versions of Windows 11 and does not affect earlier versions.
Metrics
Affected Vendors & Products
Fixes
Solution
The vulnerability has been fixed by the Grandstream Networks team in the 1.27.11 version.
Workaround
No workaround given by the vendor.
References
History
Wed, 10 Sep 2025 11:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | DLL search order hijacking vulnerability in the wave.exe executable for Windows 11, version 1.27.8. Exploitation of this vulnerability could allow attackers with local access to execute arbitrary code by placing an arbitrary file in the 'C:\Users<user>\AppData\Local\Temp' directory, which could lead to arbitrary code execution and persistence. This vulnerability is only replicable in versions of Windows 11 and does not affect earlier versions. | |
Title | DLL search order hijack in Wave by Grandstream Networks | |
Weaknesses | CWE-427 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2025-09-10T11:35:57.252Z
Reserved: 2025-04-16T09:08:23.193Z
Link: CVE-2025-40979

No data.

Status : Received
Published: 2025-09-10T12:15:33.227
Modified: 2025-09-10T12:15:33.227
Link: CVE-2025-40979

No data.

No data.