One-Click RCE in ASUS’s Preinstalled Driver Software Part Two of this series on ASUS will be dropping by the end of (this) month (06), yes it somehow manages to get worse (Everyone who made an ASUS account may have their personal info exposed).
Hi Low Level Fellas, Hope you enjoy my blog, there are ...
The title is definitely not as described, only applies to Windows (I think), and won't work without a permissions escalation.
The only reason it's classified as a CVE is because they requested it be such.
There are no payload attacks proven here, or PoC attack code. This person has been posting pretty basic "hacks" for a few years, and makes a mountain out of an anthill every damn time.
Well yeah, its a vulnerability in the windows software. Nothing they said implied otherwise.
and won't work without a permissions escalation.
I dont think thats true, could you explain why that would be? This article mentioned no need for a permissions escalation. In fact it seems that the RCE is automatically run as administrator by the driver process.
Yeah, Lemmy has a VERY large Linux user base, which means Windows discussions tend to get mocked or dismissed. But the reality is that Windows is still the dominant OS for the vast majority of users, by leaps and bounds. Linux runs the world’s infrastructure, but Windows is what the average user boots up every day.
“This exploit only works on the average user’s OS. And it only works if the user clicks the “yes” button to escalate permissions, which they have been conditioned to always do without question. Obviously this isn’t an exploit to worry about.”