When the service of ABP and AES is installed in a directory writable by non-administrative users, an attacker can replace or plant a DLL with the same name as one loaded by the service. Upon service restart, the malicious DLL is loaded and executed under the LocalSystem account, resulting in unauthorized code execution with elevated privileges.
Affected products and versions include: ABP (ASUSTOR Backup Plan) 2.0.7.9050 and earlier as well as AES (ASUSTOR EZSync) 1.0.6.8290 and earlier.
- The issue has been fixed on ABP (ASUSTOR Backup Plan) 2.0.7.10171 and AES (ASUSTOR EZSync) 1.1.0.10312.