DLL hijacking vulnerability in Evope Collector 1.1.6.9.0 and related components load the wtsapi32.dll library from an uncontrolled search path (C:\ProgramData\Evope). This allows local unprivileged attackers to execute arbitrary code or escalate privileges to SYSTEM by placing a crafted DLL in that location. The vulnerable component is Evope.Service.exe, which runs with SYSTEM privileges and automatically loads the DLL on startup or reboot.
                
            References
                    Configurations
                    No configuration.
History
                    29 Oct 2025, 15:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 8.4 | 
| CWE | CWE-427 | 
29 Oct 2025, 14:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-10-29 14:15
Updated : 2025-10-30 15:03
NVD link : CVE-2025-61161
Mitre link : CVE-2025-61161
CVE.ORG link : CVE-2025-61161
JSON object : View
Products Affected
                No product.
CWE
                
                    
                        
                        CWE-427
                        
            Uncontrolled Search Path Element
