WibuKey Runtime 6.51 contains an unquoted service path vulnerability in the WkSvW32.exe service that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted path in 'C:\PROGRAM FILES (X86)\WIBUKEY\SERVER\WkSvW32.exe' to inject malicious executables and escalate privileges.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/49999 | Exploit |
| https://www.vulncheck.com/advisories/wibukey-runtime-wksvwexe-unquoted-service-path | Third Party Advisory |
| https://www.wibu.com | Product |
| https://www.wibu.com/us/support/user/downloads-user-software.html | Product |
| https://www.exploit-db.com/exploits/49999 | Exploit |
Configurations
History
No history.
Information
Published : 2026-01-16 00:16
Updated : 2026-01-30 00:49
NVD link : CVE-2021-47810
Mitre link : CVE-2021-47810
CVE.ORG link : CVE-2021-47810
JSON object : View
Products Affected
wibu
- wibukey
CWE
CWE-428
Unquoted Search Path or Element
