CVE-2019-25344
Awaiting Analysis Awaiting Analysis - Queue
Insecure File Permissions in Wondershare MobileGo Allow Privilege Escalation

Publication date: 2026-02-12

Last updated on: 2026-02-26

Assigner: VulnCheck

Description
Wondershare MobileGo 8.5.0 contains an insecure file permissions vulnerability that allows local users to modify executable files in the application directory. Attackers can replace the original MobileGo.exe with a malicious executable to create a new user account and add it to the Administrators group with full system access.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-12
Last Modified
2026-02-26
Generated
2026-05-06
AI Q&A
2026-02-12
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
wondershare mobilego 8.5.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-732 The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

Wondershare MobileGo version 8.5.0 contains an insecure file permissions vulnerability that allows local users with limited privileges to modify executable files within the application directory.

Specifically, the executable files such as MobileGo.exe have overly permissive access controls that allow any local user to replace or modify them.

An attacker can exploit this by substituting the original MobileGo.exe with a malicious executable that, when run, creates a new user account and adds it to the Administrators group, thereby escalating privileges to full system access.


How can this vulnerability impact me? :

This vulnerability can lead to local privilege escalation, allowing an attacker with limited user rights to gain full administrative control over the affected system.

By replacing the legitimate MobileGo executable with a malicious one, the attacker can create a new administrator user account, granting themselves unrestricted access to the system.

This full system access can compromise confidentiality, integrity, and availability of the system and its data.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by checking the file permissions of executable files within the Wondershare MobileGo installation directory, such as MobileGo.exe, adb.exe, and APKInstaller.exe.'}, {'type': 'paragraph', 'content': "Specifically, look for overly permissive Access Control Lists (ACLs) that grant 'Everyone' full control over these executables, which should not be the case."}, {'type': 'paragraph', 'content': 'On a Windows system, you can use the following commands to inspect the permissions:'}, {'type': 'list_item', 'content': 'Open a Command Prompt with administrative privileges.'}, {'type': 'list_item', 'content': 'Navigate to the MobileGo installation directory, for example: cd "C:\\Program Files\\Wondershare\\MobileGo"'}, {'type': 'list_item', 'content': 'Run the command: icacls MobileGo.exe'}, {'type': 'list_item', 'content': "Check if the output shows 'Everyone:(F)' or similar full control permissions for non-administrative users."}, {'type': 'paragraph', 'content': 'If such permissions are present, the system is vulnerable to this insecure file permissions issue.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

[{'type': 'paragraph', 'content': 'To mitigate this vulnerability, immediately restrict the file permissions on the MobileGo executable files to prevent unauthorized modification.'}, {'type': 'paragraph', 'content': "Specifically, remove 'Everyone' full control permissions and ensure that only SYSTEM and Administrators have full control, while Users have only read and execute permissions."}, {'type': 'paragraph', 'content': 'You can do this by running the following command in an elevated Command Prompt:'}, {'type': 'list_item', 'content': 'icacls MobileGo.exe /remove:g Everyone'}, {'type': 'list_item', 'content': 'Then explicitly grant appropriate permissions to Administrators and SYSTEM if needed.'}, {'type': 'paragraph', 'content': 'Additionally, consider updating or patching Wondershare MobileGo if a fixed version is available from the vendor.'}, {'type': 'paragraph', 'content': 'Until a patch is applied, restrict local user access to the MobileGo installation directory to trusted administrators only.'}] [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart