DLL hijacking vulnerability in Evope Collector 1.1.6.9.0 and related components load the wtsapi32.dll library from an uncontrolled search path (C:\ProgramData\Evope). This allows local unprivileged attackers to execute arbitrary code or escalate privileges to SYSTEM by placing a crafted DLL in that location. The vulnerable component is Evope.Service.exe, which runs with SYSTEM privileges and automatically loads the DLL on startup or reboot.
References
Configurations
No configuration.
History
29 Oct 2025, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.4 |
| CWE | CWE-427 |
29 Oct 2025, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-29 14:15
Updated : 2025-10-30 15:03
NVD link : CVE-2025-61161
Mitre link : CVE-2025-61161
CVE.ORG link : CVE-2025-61161
JSON object : View
Products Affected
No product.
CWE
CWE-427
Uncontrolled Search Path Element
