CVE-2020-36927

DiskPulse Enterprise 13.6.14 contains an unquoted service path vulnerability in its Windows service configuration that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted path in 'C:\Program Files\Disk Pulse Enterprise\bin\diskpls.exe' to inject malicious executables and escalate privileges.
Configurations

Configuration 1 (hide)

cpe:2.3:a:flexense:diskpulse:13.6.14:*:*:*:enterprise:*:*:*

History

09 Feb 2026, 15:07

Type Values Removed Values Added
References () https://www.diskpulse.com - () https://www.diskpulse.com - Product
References () https://www.exploit-db.com/exploits/50012 - () https://www.exploit-db.com/exploits/50012 - Exploit
References () https://www.vulncheck.com/advisories/diskpulse-unquoted-service-path - () https://www.vulncheck.com/advisories/diskpulse-unquoted-service-path - Third Party Advisory
CPE cpe:2.3:a:flexense:diskpulse:13.6.14:*:*:*:enterprise:*:*:*
First Time Flexense diskpulse
Flexense

16 Jan 2026, 17:15

Type Values Removed Values Added
References () https://www.exploit-db.com/exploits/50012 - () https://www.exploit-db.com/exploits/50012 -

16 Jan 2026, 00:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-16 00:16

Updated : 2026-02-09 15:07


NVD link : CVE-2020-36927

Mitre link : CVE-2020-36927

CVE.ORG link : CVE-2020-36927


JSON object : View

Products Affected

flexense

  • diskpulse
CWE
CWE-428

Unquoted Search Path or Element