{"api_version":"1","generated_at":"2026-04-23T12:53:30+00:00","cve":"CVE-2025-10549","urls":{"html":"https://cve.report/CVE-2025-10549","api":"https://cve.report/api/cve/CVE-2025-10549.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2025-10549","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2025-10549"},"summary":{"title":"DLL Hijacking in EfficientLab Controlio Leads to Local Privilege Escalation","description":"EfficientLab Controlio before v1.3.95 contains a DLL hijacking vulnerability caused by weak folder permissions in the installation directory. A local attacker can place a specially crafted DLL in this directory and achieve arbitrary code execution with highest privileges, because the affected service runs as NT AUTHORITY\\SYSTEM.","state":"PUBLISHED","assigner":"SEC-VLab","published_at":"2026-04-23 07:16:39","updated_at":"2026-04-23 07:16:39"},"problem_types":["CWE-427","CWE-427 CWE-427 Uncontrolled Search Path Element"],"metrics":[],"references":[{"url":"https://r.sec-consult.com/controlio","name":"https://r.sec-consult.com/controlio","refsource":"551230f0-3615-47bd-b7cc-93e92e730bbf","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://kb.controlio.net/hc/en-us/articles/45777908471185-Client-Update-April-15-2026-ver-1-3-95","name":"https://kb.controlio.net/hc/en-us/articles/45777908471185-Client-Update-April-15-2026-ver-1-3-95","refsource":"551230f0-3615-47bd-b7cc-93e92e730bbf","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2025-10549","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-10549","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"EfficientLab, LLC","product":"Controlio","version":"affected <1.3.95","platforms":[]}],"timeline":[],"solutions":[{"source":"CNA","title":"","value":"The vendor provides a patch v1.3.95 which should be installed immediately.","time":"","lang":"en"}],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"Tobias Niemann, SEC Consult Vulnerability Lab","lang":"en"},{"source":"CNA","value":"Daniel Hirschberger, SEC Consult Vulnerability Lab","lang":"en"},{"source":"CNA","value":"Thorger Jansen, SEC Consult Vulnerability Lab","lang":"en"},{"source":"CNA","value":"Marius Renner, SEC Consult Vulnerability Lab","lang":"en"}],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Controlio","vendor":"EfficientLab, LLC","versions":[{"status":"affected","version":"<1.3.95"}]}],"credits":[{"lang":"en","type":"finder","value":"Tobias Niemann, SEC Consult Vulnerability Lab"},{"lang":"en","type":"finder","value":"Daniel Hirschberger, SEC Consult Vulnerability Lab"},{"lang":"en","type":"finder","value":"Thorger Jansen, SEC Consult Vulnerability Lab"},{"lang":"en","type":"finder","value":"Marius Renner, SEC Consult Vulnerability Lab"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"EfficientLab Controlio before v1.3.95 contains a DLL hijacking vulnerability caused by weak folder permissions in the installation directory. A local attacker can place a specially crafted DLL in this directory and achieve arbitrary code execution with highest privileges, because the affected service runs as NT AUTHORITY\\SYSTEM.<br>"}],"value":"EfficientLab Controlio before v1.3.95 contains a DLL hijacking vulnerability caused by weak folder permissions in the installation directory. A local attacker can place a specially crafted DLL in this directory and achieve arbitrary code execution with highest privileges, because the affected service runs as NT AUTHORITY\\SYSTEM."}],"impacts":[{"capecId":"CAPEC-471","descriptions":[{"lang":"en","value":"CAPEC-471 Search Order Hijacking"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-427","description":"CWE-427 Uncontrolled Search Path Element","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-23T06:57:27.220Z","orgId":"551230f0-3615-47bd-b7cc-93e92e730bbf","shortName":"SEC-VLab"},"references":[{"tags":["third-party-advisory"],"url":"https://r.sec-consult.com/controlio"},{"tags":["release-notes"],"url":"https://kb.controlio.net/hc/en-us/articles/45777908471185-Client-Update-April-15-2026-ver-1-3-95"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"The vendor provides a patch v1.3.95 which should be installed immediately.<br>"}],"value":"The vendor provides a patch v1.3.95 which should be installed immediately."}],"source":{"discovery":"EXTERNAL"},"title":"DLL Hijacking in EfficientLab Controlio Leads to Local Privilege Escalation","x_generator":{"engine":"Vulnogram 1.0.1"}}},"cveMetadata":{"assignerOrgId":"551230f0-3615-47bd-b7cc-93e92e730bbf","assignerShortName":"SEC-VLab","cveId":"CVE-2025-10549","datePublished":"2026-04-23T06:57:27.220Z","dateReserved":"2025-09-16T11:59:48.866Z","dateUpdated":"2026-04-23T06:57:27.220Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-23 07:16:39","lastModifiedDate":"2026-04-23 07:16:39","problem_types":["CWE-427","CWE-427 CWE-427 Uncontrolled Search Path Element"],"metrics":[],"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2025","CveId":"10549","Ordinal":"1","Title":"DLL Hijacking in EfficientLab Controlio Leads to Local Privilege","CVE":"CVE-2025-10549","Year":"2025"},"notes":[{"CveYear":"2025","CveId":"10549","Ordinal":"1","NoteData":"EfficientLab Controlio before v1.3.95 contains a DLL hijacking vulnerability caused by weak folder permissions in the installation directory. A local attacker can place a specially crafted DLL in this directory and achieve arbitrary code execution with highest privileges, because the affected service runs as NT AUTHORITY\\SYSTEM.","Type":"Description","Title":"DLL Hijacking in EfficientLab Controlio Leads to Local Privilege"}]}}}