CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ⬡ Vulnerabilities & CVEs Apr 22, 2026

[local] AVAST Antivirus 25.11 - Unquoted Service Path

Exploit DB Archived Apr 22, 2026 ✓ Full text saved

AVAST Antivirus 25.11 - Unquoted Service Path

Full text archived locally
✦ AI Summary · Claude Sonnet


    EXPLOIT DATABASE EXPLOITS GHDB PAPERS SHELLCODES SEARCH EDB SEARCHSPLOIT MANUAL SUBMISSIONS ONLINE TRAINING AVAST Antivirus 25.11 - Unquoted Service Path EDB-ID: 52510 CVE: N/A EDB Verified: Author: MILAD KARIMI (EX3PTIONAL) Type: LOCAL Exploit:   /   Platform: WINDOWS Date: 2026-04-22 Vulnerable App: # Exploit Title: AVAST Antivirus 25.11 - Unquoted Service Path # Exploit Author: Milad Karimi (Ex3ptionaL) # Contact: miladgrayhat@gmail.com # Date: 2025-12-17 # Vendor Homepage:https://www.avast.com/ # Software Link : https://www.avast.com/es-mx/download-thank-you.php?product=SLN&locale=es-mx # Tested Version: 25.11 # Tested on OS: Windows 11 Description AVAST Antivirus 25.11 an unquoted service path vulnerability that allows local non-privileged users to potentially execute code with elevated SYSTEM privileges. Attackers can exploit the unquoted service path configuration to inject malicious executables that will be run with high-level system permissions. PoC C:\>sc qc SecureLine [SC] QueryServiceConfig CORRECTO NOMBRE_SERVICIO: SecureLine TIPO : 10 WIN32_OWN_PROCESS TIPO_INICIO : 2 AUTO_START CONTROL_ERROR : 1 NORMAL NOMBRE_RUTA_BINARIO: C:\Program Files\AVAST Software\SecureLine\VpnSvc.exe GRUPO_ORDEN_CARGA : ETIQUETA : 0 NOMBRE_MOSTRAR : Avast SecureLine DEPENDENCIAS : NOMBRE_INICIO_SERVICIO: LocalSystem Copy Tags: Advisory/Source: Link Databases Links Sites Solutions Exploits Search Exploit-DB OffSec Courses and Certifications Google Hacking Submit Entry Kali Linux Learn Subscriptions Papers SearchSploit Manual VulnHub OffSec Cyber Range Shellcodes Exploit Statistics Proving Grounds Penetration Testing Services
    💬 Team Notes
    Article Info
    Source
    Exploit DB
    Category
    ⬡ Vulnerabilities & CVEs
    Published
    Apr 22, 2026
    Archived
    Apr 22, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗