Description
Tosibox Key Service 3.3.0 contains an unquoted service path vulnerability that allows local non-privileged users to potentially execute code with elevated system privileges. Attackers can exploit the service startup process by inserting malicious code in the system root path, enabling unauthorized code execution during application startup or system reboot.
References
https://packetstormsecurity.com/files/177260/
Third Party Advisory
Product
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2024-5812.php
Third Party AdvisoryExploit
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2024-5812.php
Third Party AdvisoryExploit
CVSS impact metrics
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.4 · High
Information
Source identifier
Vulnerability status
Analyzed
Published
2025-12-30T23:15:48.700Z
2 weeks agoLast modified
2026-01-09T22:02:57.330Z
5 days ago