Impact
GatewayGeo MapServer for Windows 5 contains a Dynamic-link Library Injection flaw that enables an attacker to run a specially crafted executable, resulting in the execution of injected code with elevated privileges. The weakness is a classic case of improper handling of DLL loading, classed under CWE‑427. The impact is the potential compromise of all system resources and data on the host, allowing the attacker to modify, exfiltrate, or delete information, and to gain full control of the affected machine.
Affected Systems
The vulnerability affects GatewayGeo MapServer for Windows version 5. No vendor information is listed, and no other affected versions are specified.
Risk and Exploitability
The CVSS score of 8.8 indicates a high severity risk, while the EPSS score is not available and the flaw is not listed in the CISA KEV catalog. The exploit requires an attacker to deliver a crafted executable to the target system; it is inferred that the attack vector is local privilege escalation, though a remote delivery path could exist if an attacker can compromise user execution. The lack of a publicly available patch increases the urgency for mitigation.
OpenCVE Enrichment