CVE-2019-25344
Insecure File Permissions in Wondershare MobileGo Allow Privilege Escalation
Publication date: 2026-02-12
Last updated on: 2026-02-26
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wondershare | mobilego | 8.5.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-732 | The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
Wondershare MobileGo version 8.5.0 contains an insecure file permissions vulnerability that allows local users with limited privileges to modify executable files within the application directory.
Specifically, the executable files such as MobileGo.exe have overly permissive access controls that allow any local user to replace or modify them.
An attacker can exploit this by substituting the original MobileGo.exe with a malicious executable that, when run, creates a new user account and adds it to the Administrators group, thereby escalating privileges to full system access.
How can this vulnerability impact me? :
This vulnerability can lead to local privilege escalation, allowing an attacker with limited user rights to gain full administrative control over the affected system.
By replacing the legitimate MobileGo executable with a malicious one, the attacker can create a new administrator user account, granting themselves unrestricted access to the system.
This full system access can compromise confidentiality, integrity, and availability of the system and its data.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability can be detected by checking the file permissions of executable files within the Wondershare MobileGo installation directory, such as MobileGo.exe, adb.exe, and APKInstaller.exe.'}, {'type': 'paragraph', 'content': "Specifically, look for overly permissive Access Control Lists (ACLs) that grant 'Everyone' full control over these executables, which should not be the case."}, {'type': 'paragraph', 'content': 'On a Windows system, you can use the following commands to inspect the permissions:'}, {'type': 'list_item', 'content': 'Open a Command Prompt with administrative privileges.'}, {'type': 'list_item', 'content': 'Navigate to the MobileGo installation directory, for example: cd "C:\\Program Files\\Wondershare\\MobileGo"'}, {'type': 'list_item', 'content': 'Run the command: icacls MobileGo.exe'}, {'type': 'list_item', 'content': "Check if the output shows 'Everyone:(F)' or similar full control permissions for non-administrative users."}, {'type': 'paragraph', 'content': 'If such permissions are present, the system is vulnerable to this insecure file permissions issue.'}] [1]
What immediate steps should I take to mitigate this vulnerability?
[{'type': 'paragraph', 'content': 'To mitigate this vulnerability, immediately restrict the file permissions on the MobileGo executable files to prevent unauthorized modification.'}, {'type': 'paragraph', 'content': "Specifically, remove 'Everyone' full control permissions and ensure that only SYSTEM and Administrators have full control, while Users have only read and execute permissions."}, {'type': 'paragraph', 'content': 'You can do this by running the following command in an elevated Command Prompt:'}, {'type': 'list_item', 'content': 'icacls MobileGo.exe /remove:g Everyone'}, {'type': 'list_item', 'content': 'Then explicitly grant appropriate permissions to Administrators and SYSTEM if needed.'}, {'type': 'paragraph', 'content': 'Additionally, consider updating or patching Wondershare MobileGo if a fixed version is available from the vendor.'}, {'type': 'paragraph', 'content': 'Until a patch is applied, restrict local user access to the MobileGo installation directory to trusted administrators only.'}] [1]