Dynojet Power Core 2.3.0 contains an unquoted service path vulnerability in the DJ.UpdateService that allows local authenticated users to potentially execute code with elevated privileges. Attackers can exploit the unquoted binary path by placing malicious executables in the service's file path to gain Local System access.
References
| Link | Resource |
|---|---|
| https://www.dynojet.com/ | Product |
| https://www.exploit-db.com/exploits/50466 | Exploit |
| https://www.exploit-db.com/exploits/50466 | Exploit |
Configurations
History
23 Jan 2026, 18:07
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.dynojet.com/ - Product | |
| References | () https://www.exploit-db.com/exploits/50466 - Exploit | |
| CPE | cpe:2.3:a:dynojet:power_core:2.3.0:*:*:*:*:*:*:* | |
| First Time |
Dynojet power Core
Dynojet |
15 Jan 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.exploit-db.com/exploits/50466 - |
15 Jan 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-15 16:16
Updated : 2026-01-23 18:07
NVD link : CVE-2021-47773
Mitre link : CVE-2021-47773
CVE.ORG link : CVE-2021-47773
JSON object : View
Products Affected
dynojet
- power_core
CWE
CWE-428
Unquoted Search Path or Element
