Zillya Total Security 3.0.2367.0 contains a privilege escalation vulnerability that allows low-privileged users to copy files to unauthorized system locations using the quarantine module. Attackers can leverage symbolic link techniques to restore quarantined files to restricted directories, potentially enabling system-level access through techniques like DLL hijacking.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/51151 | Exploit Third Party Advisory |
| https://www.vulncheck.com/advisories/zillya-total-security-local-privilege-escalation-via-quarantine-module | Third Party Advisory |
| https://zillya.com/ | Product |
| https://www.exploit-db.com/exploits/51151 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-12-22 22:16
Updated : 2026-01-03 21:15
NVD link : CVE-2023-53973
Mitre link : CVE-2023-53973
CVE.ORG link : CVE-2023-53973
JSON object : View
Products Affected
zillya
- total_security
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')
