A vulnerability was found in MTSoftware C-Lodop 6.6.1.1 on Windows. It has been rated as critical. This issue affects some unknown processing of the component CLodopPrintService. The manipulation leads to unquoted search path. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 6.6.13 is able to address this issue. It is recommended to upgrade the affected component.
The product searches for critical resources using an externally-supplied search path that can point to resources that are not under the product's direct control.
The product uses a search path that contains an unquoted element, in which the element contains whitespace or other separators. This can cause the product to access resources in a parent path.
Link | Tags |
---|---|
https://vuldb.com/?id.308285 | technical description third party advisory vdb entry |
https://vuldb.com/?ctiid.308285 | permissions required signature vdb entry |
https://vuldb.com/?submit.566789 | third party advisory vdb entry |
https://0nightsedge0.github.io/2025/05/14/CVE-2025-4540-C-Lodop/ | third party advisory exploit |