Impact
The vulnerability arises when installers of LiveOn Meet Client for Windows and Canon Network Camera Plugin load dynamic link libraries from the current directory without verifying their origin. If an attacker places a malicious DLL in the same folder as the installer, the installer will load and execute that DLL with the privileges of the user running it, effectively allowing arbitrary code execution with user-level rights.
Affected Systems
Affected products are LiveOn Meet Client installers (Downloader5Installer.exe and Downloader5InstallerForAdmin.exe) and Canon Network Camera Plugin installers (CanonNWCamPlugin.exe and CanonNWCamPluginForAdmin.exe) released by Japan Media Systems Corporation.
Risk and Exploitability
The CVSS score of 8.4 indicates high severity. The EPSS score of less than1% suggests that exploitation is currently unlikely, and the vulnerability is not listed in CISA's KEV catalog. Nonetheless, an attacker who can place a DLL in the installer directory—such as a local user with write access—could trigger the vulnerability by executing the malicious code during installation. Based on the description, the likely attack vector is local and requires the attacker to have write permission to the directory containing the installer executable.
OpenCVE Enrichment