Impact
The Qsee Client installer for versions 1.0.1 and earlier loads dynamic link libraries from the current directory without proper validation. If a malicious DLL is placed beside the installer and the affected installer is executed, the loader will run the DLL with the administrative privileges that the installer possesses. This results in arbitrary code execution with elevated rights, allowing an attacker to perform any action the admin user can, including installing back‑doors, modifying system configuration, or compromising other accounts.
Affected Systems
The vulnerability affects the Qsee Client application released by Q‑See under the product name Qsee Client. Versions 1.0.1 and all earlier releases on Windows are impacted. The insecure DLL loading behavior exists in the installer payload executed during installation.
Risk and Exploitability
The CVSS score of 8.4 indicates a high severity flaw. The EPSS score of less than 1% suggests that while the vulnerability is serious, the current likelihood of exploitation is low. The flaw is not listed in the CISA KEV catalog. The attack requires local access to the installation environment to place a crafted DLL in the installer’s directory; an attacker can then launch the installer, triggering execution of the malicious code with administrator privileges. Because the requirement is only local installation, the risk is primarily for privileged users or systems where untrusted installers are run without monitoring.
OpenCVE Enrichment