plays_service.exe in the plays.tv service before 1.27.7.0, as distributed in AMD driver-installation packages and Gaming Evolved products, executes code at a user-defined (local or SMB) path as SYSTEM when the execute_installer parameter is used in an HTTP message. This occurs without properly authenticating the user.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
https://github.com/securifera/CVE-2018-6546-Exploit/ | third party advisory exploit |
https://www.exploit-db.com/exploits/44476/ | exploit vdb entry third party advisory |
https://www.securifera.com/advisories/CVE-2018-6546/ | third party advisory |