CVE-2021-47833

7.8 HIGH

📋 TL;DR

CVE-2021-47833 is an unquoted service path vulnerability in WifiHotSpot 1.0.0.0 that allows local attackers to execute arbitrary code with LocalSystem privileges. Attackers can place malicious executables in the unquoted service path directory, which get executed during system startup or reboot. This affects all users running the vulnerable version of WifiHotSpot.

💻 Affected Systems

Products:
  • WifiHotSpot
Versions: 1.0.0.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default installation of WifiHotSpot 1.0.0.0. The WifiHotSpotService.exe runs with LocalSystem privileges by default.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with LocalSystem privileges, allowing attackers to install persistent malware, steal credentials, modify system files, and gain complete control over the affected system.

🟠

Likely Case

Local privilege escalation leading to installation of backdoors, credential theft, and lateral movement within the network.

🟢

If Mitigated

Limited impact with proper endpoint protection, application whitelisting, and service hardening in place.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to the system.
🏢 Internal Only: HIGH - Attackers with initial access to a system can escalate privileges to LocalSystem, enabling lateral movement and persistence.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit code is publicly available on Exploit-DB (ID 49845). Attack requires local access to the system and ability to write to the service path directory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: https://wifi-hotspot.gearboxcomputers.com/

Restart Required: No

Instructions:

No official patch available. Uninstall WifiHotSpot 1.0.0.0 and use alternative software. Check vendor website for updated versions.

🔧 Temporary Workarounds

Quote Service Path

windows

Manually add quotes around the service path in Windows Registry to prevent exploitation

sc config WifiHotSpotService binPath= "C:\Program Files\WifiHotSpot\WifiHotSpotService.exe"

Restrict Directory Permissions

windows

Remove write permissions for non-administrative users on the WifiHotSpot installation directory

icacls "C:\Program Files\WifiHotSpot" /deny Users:(OI)(CI)W

🧯 If You Can't Patch

  • Uninstall WifiHotSpot 1.0.0.0 completely from all systems
  • Implement application whitelisting to prevent execution of unauthorized binaries in service directories

🔍 How to Verify

Check if Vulnerable:

Check if WifiHotSpot 1.0.0.0 is installed and if the service path in Registry (HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WifiHotSpotService) is unquoted

Check Version:

Check Add/Remove Programs or run: wmic product where name="WifiHotSpot" get version

Verify Fix Applied:

Verify service path is quoted in Registry and non-admin users cannot write to WifiHotSpot installation directory

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing unexpected processes running as LocalSystem from WifiHotSpot directory
  • Process creation events for executables in WifiHotSpot directory with LocalSystem privileges

Network Indicators:

  • Unusual outbound connections from systems running WifiHotSpot service

SIEM Query:

EventID=4688 AND NewProcessName="*WifiHotSpot*" AND SubjectUserName="SYSTEM"

🔗 References

📤 Share & Export