Vulnerability in Remote Desktop Commander Suite Agent

IF a customer a.) installed our Agent service in the default path C:\Programs\RDPSoft\Remote Desktop Reporter Agent and b.) has not softened the standard Windows NTFS permissions in the root of C:\ or under the C:\Programs folder. By default, standard users do not have permission to create new files in the root of C: or in the Program Files folder and its subfolders. If our agent service has been installed in a different folder and/or the default NTFS permissions have been weakened, this may result in the unquoted service path being exploited.

Twitter
LinkedIn
Facebook

CVE

Vulnerability type

Pentester

Publication

Software version

Timeline