Description
The installers of LiveOn Meet Client for Windows (Downloader5Installer.exe and Downloader5InstallerForAdmin.exe) and the installers of Canon Network Camera Plugin (CanonNWCamPlugin.exe and CanonNWCamPluginForAdmin.exe) insecurely load Dynamic Link Libraries (DLLs). If a malicious DLL is placed at the same directory, the affected installer may load that DLL and execute its code with the privilege of the user invoking the installer.
Published: 2026-04-23
Score: 8.4 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege escalation via DLL hijacking
Action: Update installers
AI Analysis

Impact

The vulnerability arises when installers of LiveOn Meet Client for Windows and Canon Network Camera Plugin load dynamic link libraries from the current directory without verifying their origin. If an attacker places a malicious DLL in the same folder as the installer, the installer will load and execute that DLL with the privileges of the user running it, effectively allowing arbitrary code execution with user-level rights.

Affected Systems

Affected products are LiveOn Meet Client installers (Downloader5Installer.exe and Downloader5InstallerForAdmin.exe) and Canon Network Camera Plugin installers (CanonNWCamPlugin.exe and CanonNWCamPluginForAdmin.exe) released by Japan Media Systems Corporation.

Risk and Exploitability

The CVSS score of 8.4 indicates high severity. The EPSS score of less than1% suggests that exploitation is currently unlikely, and the vulnerability is not listed in CISA's KEV catalog. Nonetheless, an attacker who can place a DLL in the installer directory—such as a local user with write access—could trigger the vulnerability by executing the malicious code during installation. Based on the description, the likely attack vector is local and requires the attacker to have write permission to the directory containing the installer executable.

Generated by OpenCVE AI on April 29, 2026 at 01:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Obtain the latest installer from an official, verified source and reinstall the software. This applies the vendor’s fix that mitigates the DLL hijacking vulnerability (CWE‑427).
  • Restrict write permissions on the directory that contains the installers so that only authorized administrators can modify its contents, applying ACLs that deny write access to all non-administrative accounts.
  • Enable application whitelisting or enforce module signing so that only signed, trusted DLLs can be loaded during installation. Configuring Windows Defender Exploit Guard or similar tools will block unauthorized DLL injection attempts.

Generated by OpenCVE AI on April 29, 2026 at 01:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 18 May 2026 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Liveon
Liveon canonnwcamplugin.exe
Liveon canonnwcampluginforadmin.exe
Liveon downloader5installer.exe
Liveon downloader5installerforadmin.exe
CPEs cpe:2.3:a:liveon:canonnwcamplugin.exe:1.0.0.0:*:*:*:*:windows:*:*
cpe:2.3:a:liveon:canonnwcampluginforadmin.exe:1.0.0.0:*:*:*:*:windows:*:*
cpe:2.3:a:liveon:downloader5installer.exe:1.0.0.0:*:*:*:*:windows:*:*
cpe:2.3:a:liveon:downloader5installerforadmin.exe:1.0.0.0:*:*:*:*:windows:*:*
Vendors & Products Liveon
Liveon canonnwcamplugin.exe
Liveon canonnwcampluginforadmin.exe
Liveon downloader5installer.exe
Liveon downloader5installerforadmin.exe

Wed, 29 Apr 2026 02:00:00 +0000

Type Values Removed Values Added
Title DLL Hijacking in LiveOn Meet and CanonNWCam Plugin Installers

Tue, 28 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Japan Media Systems Corporation
Japan Media Systems Corporation canonnwcamplugin.exe
Japan Media Systems Corporation canonnwcampluginforadmin.exe
Japan Media Systems Corporation downloader5installer.exe
Japan Media Systems Corporation downloader5installerforadmin.exe
Vendors & Products Japan Media Systems Corporation
Japan Media Systems Corporation canonnwcamplugin.exe
Japan Media Systems Corporation canonnwcampluginforadmin.exe
Japan Media Systems Corporation downloader5installer.exe
Japan Media Systems Corporation downloader5installerforadmin.exe

Thu, 23 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Description The installers of LiveOn Meet Client for Windows (Downloader5Installer.exe and Downloader5InstallerForAdmin.exe) and the installers of Canon Network Camera Plugin (CanonNWCamPlugin.exe and CanonNWCamPluginForAdmin.exe) insecurely load Dynamic Link Libraries (DLLs). If a malicious DLL is placed at the same directory, the affected installer may load that DLL and execute its code with the privilege of the user invoking the installer.
Weaknesses CWE-427
References
Metrics cvssV3_0

{'score': 7.8, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.4, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Japan Media Systems Corporation Canonnwcamplugin.exe Canonnwcampluginforadmin.exe Downloader5installer.exe Downloader5installerforadmin.exe
Liveon Canonnwcamplugin.exe Canonnwcampluginforadmin.exe Downloader5installer.exe Downloader5installerforadmin.exe
cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published:

Updated: 2026-04-23T16:23:44.557Z

Reserved: 2026-04-20T02:53:09.291Z

Link: CVE-2026-32679

cve-icon Vulnrichment

Updated: 2026-04-23T14:18:28.681Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-23T00:16:45.157

Modified: 2026-05-18T17:04:05.057

Link: CVE-2026-32679

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T01:45:26Z

Weaknesses