BenimPOS Masaustu 3.0.x is affected by insecure file permissions. The application installation directory grants Everyone and BUILTIN\Users groups FILE_ALL_ACCESS, allowing local users to replace or modify .exe and .dll files. This may lead to privilege escalation or arbitrary code execution upon launch by another user or elevated context.
References
Link | Resource |
---|---|
https://github.com/meisterlos/BenimPOS-POC | Exploit Third Party Advisory |
https://github.com/meisterlos/CVE-2025-57392 | Exploit Third Party Advisory |
Configurations
History
17 Sep 2025, 21:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/meisterlos/BenimPOS-POC - Exploit, Third Party Advisory | |
References | () https://github.com/meisterlos/CVE-2025-57392 - Exploit, Third Party Advisory | |
First Time |
Benimpos
Benimpos benimpos |
|
CPE | cpe:2.3:a:benimpos:benimpos:3.0:*:*:*:*:*:*:* |
10 Sep 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CWE | CWE-732 |
10 Sep 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-10 18:15
Updated : 2025-09-17 21:22
NVD link : CVE-2025-57392
Mitre link : CVE-2025-57392
CVE.ORG link : CVE-2025-57392
JSON object : View
Products Affected
benimpos
- benimpos
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource