EPSON Status Monitor 3 version 8.0 contains an unquoted...
High severity
Unreviewed
Published
Jan 27, 2026
to the GitHub Advisory Database
Description
Published by the National Vulnerability Database
Jan 27, 2026
Published to the GitHub Advisory Database
Jan 27, 2026
EPSON Status Monitor 3 version 8.0 contains an unquoted service path vulnerability that allows local attackers to potentially execute arbitrary code by exploiting the service binary path. Attackers can leverage the unquoted path in 'C:\Program Files\Common Files\EPSON\EPW!3SSRP\E_S60RPB.EXE' to inject malicious executables and escalate privileges.
References