Authored by Esant1490

Dr. Fone version 4.0.8 suffers from an unquoted service path vulnerability.

# Exploit Title: Dr. Fone v4.0.8- 'net_updater32.exe' Unquoted Service Path
# Discovery Date: 2022-05-07
# Discovery by: Esant1490
# Vendor Homepage: https://drfone.wondershare.net
# Software Link : https://download.wondershare.net/drfone_full4008.exe
# Tested Version: 4.0.8
# Tested on OS: Windows 10 Pro x64 en
# Vulnerability Type: Unquoted Service Path

# Find the discover Unquoted Service Path Vulnerability:

C:>wmic service get name,displayname,pathname,startmode |findstr /i "auto"
|findstr /i /v "C:Windows" |findstr /i /v """

Wondershare Install Assist Service Wondershare InstallAssist
C:ProgramDataWondershareServiceInstallAssistService.exe Auto

Wondershare Application Framework Service WsAppService C:Program Files
(x86)WondershareWAF2.4.3.243WsAppService.exe Auto
Wondershare Application Update Service 3.0

WsAppService3 C:Program Files
(x86)WondershareWAF33.0.0.308WsAppService3.exe Auto

Wondershare Driver Install Service WsDrvInst C:Program Files
(x86)WondersharedrfoneAddinsUnlockDriverInstall.exe Auto

# Service info:

C:>sc qc WsDrvInst
[SC] QueryServiceConfig CORRECTO

NOMBRE_SERVICIO: WsDrvInst
TIPO : 10 WIN32_OWN_PROCESS
TIPO_INICIO : 2 AUTO_START
CONTROL_ERROR : 1 NORMAL
NOMBRE_RUTA_BINARIO: C:Program Files
(x86)WondersharedrfoneAddinsUnlockDriverInstall.exe
GRUPO_ORDEN_CARGA :
ETIQUETA : 0
NOMBRE_MOSTRAR : Wondershare Driver Install Service
DEPENDENCIAS : RPCSS
NOMBRE_INICIO_SERVICIO: LocalSystem

#Exploit:

A successful attempt to exploit this vulnerability could allow to execute
code during startup or reboot with the elevated privileges.