CVE-2022-50935
Unknown Unknown - Not Provided
Unquoted Service Path Vulnerability in Flame II HSPA USB Modem Allows Privilege Escalation

Publication date: 2026-01-13

Last updated on: 2026-01-13

Assigner: VulnCheck

Description
Flame II HSPA USB Modem contains an unquoted service path vulnerability in its Windows service configuration. Attackers can exploit the unquoted path in 'C:\Program Files (x86)\Internet Telcel\ApplicationController.exe' to execute arbitrary code with elevated system privileges.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-13
Last Modified
2026-01-13
Generated
2026-05-07
AI Q&A
2026-01-14
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
telcel flame_ii_hspa_usb_modem to 2026-01-13 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-428 The product uses a search path that contains an unquoted element, in which the element contains whitespace or other separators. This can cause the product to access resources in a parent path.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an unquoted service path issue in the Windows service configuration of the Flame II HSPA USB Modem. The service executable path 'C:\Program Files (x86)\Internet Telcel\ApplicationController.exe' is not enclosed in quotes. Because the path contains spaces, Windows may misinterpret it and execute a malicious executable placed by an attacker in a higher-level directory. This allows an attacker with local access to execute arbitrary code with elevated system privileges. [2, 3]


How can this vulnerability impact me? :

An attacker with local access can exploit this vulnerability to execute arbitrary code with elevated system privileges on the affected system. This can lead to a full compromise of the system's confidentiality, integrity, and availability, allowing the attacker to perform unauthorized actions with high privileges. [2, 3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

You can detect this vulnerability on your Windows system by checking the service configuration for unquoted service paths, especially for the 'FLAME II HSPA USB MODEM Service'. Useful commands include: - Using WMIC to list services with automatic start mode excluding Windows system paths and quoted paths: wmic service get name, displayname, pathname, startmode | findstr /i "Auto" | findstr /i /v "C:\Windows\\" | findstr /i /v '"' - Using SC to query the specific service configuration: sc qc "FLAME II HSPA USB MODEM Service" These commands help identify if the service executable path is unquoted and contains spaces, which indicates the vulnerability. [2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include correcting the unquoted service path by enclosing the executable path in quotation marks to prevent Windows from misinterpreting the path. Specifically, update the service configuration so that the binary path is quoted, e.g., "C:\Program Files (x86)\Internet Telcel\ApplicationController.exe". Additionally, restrict local access to the system to prevent attackers from exploiting the vulnerability, as it requires local access. If possible, check for vendor patches or updates addressing this issue. [2, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart