FreeLAN 2.2 contains an unquoted service path vulnerability in its Windows service configuration that allows local attackers to execute arbitrary code. Attackers can exploit the unquoted binary path to inject malicious executables that will be launched with elevated LocalSystem privileges during service startup.
Metrics
Affected Vendors & Products
References
History
Fri, 23 Jan 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Freelan
Freelan freelan |
|
| Vendors & Products |
Freelan
Freelan freelan |
Thu, 22 Jan 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 21 Jan 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | FreeLAN 2.2 contains an unquoted service path vulnerability in its Windows service configuration that allows local attackers to execute arbitrary code. Attackers can exploit the unquoted binary path to inject malicious executables that will be launched with elevated LocalSystem privileges during service startup. | |
| Title | FreeLAN 2.2 - 'FreeLAN Service' Unquoted Service Path | |
| Weaknesses | CWE-428 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-01-21T17:27:52.309Z
Updated: 2026-01-22T16:51:36.180Z
Reserved: 2026-01-18T12:35:05.172Z
Link: CVE-2021-47882
Updated: 2026-01-22T16:46:56.051Z
Status : Received
Published: 2026-01-21T18:16:22.417
Modified: 2026-01-21T18:16:22.417
Link: CVE-2021-47882
No data.