Impact
Service registration uses unquoted file paths, enabling execution of arbitrary code with SYSTEM privileges when the user has write access on the system drive root. This flaw allows a local attacker to execute programs with unwarranted elevated privileges, potentially leading to full system compromise.
Affected Systems
Susceptible products are SANYO DENKI CO., LTD.'s SANUPS SOFTWARE and SANUPS SOFTWARE STANDALONE. No specific version details are supplied; the issue exists across all releases listed in the references.
Risk and Exploitability
The CVSS score of 8.4 indicates a high severity vulnerability. While EPSS data is unavailable and the vulnerability is not listed in KEV, the requirement for write permission on the system drive root suggests a local attack vector. An attacker with such local access can immediately gain SYSTEM level code execution, making this flaw a serious threat if left unaddressed.
OpenCVE Enrichment