CVE-2025-26860
📋 TL;DR
CVE-2025-26860 is a DLL hijacking vulnerability in RemoteCall Remote Support Program (for Operator) that allows attackers to execute arbitrary code by placing a malicious DLL in the same directory as the application. This affects all versions prior to 5.1.0. Organizations using this remote support software are at risk if attackers can place files in application directories.
💻 Affected Systems
- RemoteCall Remote Support Program (for Operator)
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with administrative privileges, allowing attackers to install malware, steal credentials, pivot to other systems, and maintain persistent access.
Likely Case
Local privilege escalation leading to unauthorized access to sensitive data, system configuration changes, or installation of backdoors on affected workstations.
If Mitigated
Limited impact with proper file permissions preventing DLL placement, though the vulnerability remains present in the software.
🎯 Exploit Status
Exploitation requires local file system access to place malicious DLL. No authentication bypass needed if attacker can write to application directory.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.1.0
Vendor Advisory: https://www.remotecall.com/en/support/download/
Restart Required: Yes
Instructions:
1. Download version 5.1.0 or later from RemoteCall website. 2. Uninstall previous version. 3. Install new version. 4. Restart system.
🔧 Temporary Workarounds
Restrict directory permissions
windowsSet strict file permissions on RemoteCall installation directory to prevent unauthorized DLL placement
icacls "C:\Program Files\RemoteCall" /deny Everyone:(OI)(CI)(WD,AD)
Use application whitelisting
windowsConfigure Windows Defender Application Control or similar to only allow signed DLLs to load
🧯 If You Can't Patch
- Monitor for unauthorized DLL files in RemoteCall directories using file integrity monitoring
- Implement least privilege access controls to limit who can write to application directories
🔍 How to Verify
Check if Vulnerable:
Check RemoteCall version in Help > About. If version is below 5.1.0, the system is vulnerable.
Check Version:
wmic product where name="RemoteCall" get version
Verify Fix Applied:
Verify version is 5.1.0 or higher in Help > About. Test by attempting to place a test DLL in the installation directory (should be blocked if permissions are properly configured).
📡 Detection & Monitoring
Log Indicators:
- Windows Event Logs showing DLL loading from unusual locations
- Process Monitor logs showing DLL hijacking attempts
Network Indicators:
- Unusual outbound connections from RemoteCall process after DLL loading
SIEM Query:
EventID=7 AND (ImagePath:*RemoteCall* OR ProcessName:RemoteCall*) AND (ImageLoaded:*dll)