DLL search path hijacking vulnerability in the UPDF.exe executable for Windows version 1.8.5.0 allows attackers with local access to execute arbitrary code by placing a dxtn.dll file of their choice in the 'C:\Users\<user>\AppData\Local\Microsoft\WindowsApps\' directory, which could lead to arbitrary code execution and persistence.
References
| Link | Resource |
|---|---|
| https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-updf | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-09-10 12:15
Updated : 2026-01-29 01:50
NVD link : CVE-2025-10213
Mitre link : CVE-2025-10213
CVE.ORG link : CVE-2025-10213
JSON object : View
Products Affected
updf
- updf
CWE
CWE-427
Uncontrolled Search Path Element
