Home[1] Files[2] News[3] &[SERVICES_TAB] Contact[4] Add New[5]
- Terratec dmx_6fire USB 1.23.0.02 Unquoted Service Path[6]
- Authored by Joseph Kwabena Fiagbor[7]
-
Terratec dmx_6fire USB version 1.23.0.02 suffers from an unquoted service path vulnerability.
- advisories | CVE-2024-31804[8]
- SHA-256 |
3b1ae38d17de2b6bb05d853af820ee9f6f5e2f2251357f5de9240f209b72112f
- Download[9] | Favorite[10] | View[11]
Change Mirror[12] Download[13]
# Exploit Title: Terratec dmx_6fire USB - Unquoted Service Path
# Google Dork: null
# Date: 4/10/2024
# Exploit Author: Joseph Kwabena Fiagbor
# Vendor Homepage: https://dmx-6fire-24-96-controlpanel.software.informer.com/download/
# Software Link:
# Version: v.1.23.0.02
# Tested on: windows 7-11
# CVE : CVE-2024-31804
1. Description:
The Terratec dmx_6fire usb installs as a service with an unquoted service
path running
with SYSTEM privileges.
This could potentially allow an authorized but non-privileged local
user to execute arbitrary code with elevated privileges on the system.
2. Proof
> C:\Users\Astra>sc qc "ttdmx6firesvc"
> {SC] QueryServiceConfig SUCCESS
>
> SERVICE_NAME: ttdmx6firesvc
> TYPE : 10 WIN32_OWN_PROCESS
> START_TYPE : 2 AUTO_START
> ERROR_CONTROL : 1 NORMAL
> BINARY_PATH_NAME : C:\Program Files\TerraTec\DMX6FireUSB\ttdmx6firesvc.exe -service
> LOAD_ORDER_GROUP : PlugPlay
> TAG : 0
> DISPLAY_NAME : DMX6Fire Control
> DEPENDENCIES : eventlog
> : PlugPlay
> SERVICE_START_NAME : LocalSystem
>
>
File Tags
- ActiveX[19] (933)
- Advisory[20] (84,757)
- Arbitrary[21] (16,648)
- BBS[22] (2,859)
- Bypass[23] (1,826)
- CGI[24] (1,032)
- Code Execution[25] (7,630)
- Conference[26] (689)
- Cracker[27] (844)
- CSRF[28] (3,373)
- DoS[29] (24,538)
- Encryption[30] (2,383)
- Exploit[31] (52,797)
- File Inclusion[32] (4,251)
- File Upload[33] (986)
- Firewall[34] (822)
- Info Disclosure[35] (2,847)
- Intrusion Detection[36] (906)
- Java[37] (3,118)
- JavaScript[38] (889)
- Kernel[39] (7,007)
- Local[40] (14,711)
- Magazine[41] (586)
- Overflow[42] (13,034)
- Perl[43] (1,430)
- PHP[44] (5,197)
- Proof of Concept[45] (2,368)
- Protocol[46] (3,695)
- Python[47] (1,599)
- Remote[48] (31,406)
- Root[49] (3,618)
- Rootkit[50] (522)
- Ruby[51] (619)
- Scanner[52] (1,650)
- Security Tool[53] (7,978)
- Shell[54] (3,249)
- Shellcode[55] (1,217)
- Sniffer[56] (900)
- Spoof[57] (2,258)
- SQL Injection[58] (16,531)
- TCP[59] (2,423)
- Trojan[60] (689)
- UDP[61] (897)
- Virus[62] (668)
- Vulnerability[63] (32,574)
- Web[64] (9,867)
- Whitepaper[65] (3,773)
- x86[66] (967)
- XSS[67] (18,171)
- Other[68]
File Archives
- April 2024[69]
- March 2024[70]
- February 2024[71]
- January 2024[72]
- December 2023[73]
- November 2023[74]
- October 2023[75]
- September 2023[76]
- August 2023[77]
- July 2023[78]
- June 2023[79]
- May 2023[80]
- Older[81]
Systems
- AIX[82] (429)
- Apple[83] (2,078)
- BSD[84] (376)
- CentOS[85] (58)
- Cisco[86] (1,927)
- Debian[87] (7,004)
- Fedora[88] (1,693)
- FreeBSD[89] (1,246)
- Gentoo[90] (4,467)
- HPUX[91] (880)
- iOS[92] (373)
- iPhone[93] (108)
- IRIX[94] (220)
- Juniper[95] (69)
- Linux[96] (49,155)
- Mac OS X[97] (691)
- Mandriva[98] (3,105)
- NetBSD[99] (256)
- OpenBSD[100] (488)
- RedHat[101] (15,452)
- Slackware[102] (941)
- Solaris[103] (1,611)
- SUSE[104] (1,444)
- Ubuntu[105] (9,427)
- UNIX[106] (9,388)
- UnixWare[107] (187)
- Windows[108] (6,647)
- Other[109]
- Services
- Security Services[120]
- Hosting By
- Rokasec[121]