Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 14 Jan 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sevencs
Sevencs ec2007 Kernel Sevencs orca G2 |
|
| CPEs | cpe:2.3:a:sevencs:ec2007_kernel:5.22:*:*:*:*:*:*:* cpe:2.3:a:sevencs:orca_g2:2.0.1.35:*:*:*:*:*:*:* |
|
| Vendors & Products |
Sevencs
Sevencs ec2007 Kernel Sevencs orca G2 |
Fri, 02 Jan 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-367 | |
| Metrics |
cvssV3_1
|
Wed, 31 Dec 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A local privilege escalation vulnerability exists in SevenCs ORCA G2 2.0.1.35 (EC2007 Kernel v5.22). The flaw is a Time-of-Check Time-of-Use (TOCTOU) race condition in the license management logic. The regService process, which runs with SYSTEM privileges, creates a fixed directory and writes files without verifying whether the path is an NTFS reparse point. By exploiting this race condition, an attacker can replace the target directory with a junction pointing to a user-controlled path. This causes the SYSTEM-level process to drop binaries in a location fully controlled by the attacker, allowing arbitrary code execution with SYSTEM privileges. The vulnerability can be exploited by any standard user with only a single UAC confirmation, making it highly practical and dangerous in real-world environments. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-01-02T18:05:57.530Z
Reserved: 2025-09-26T00:00:00.000Z
Link: CVE-2025-61037
Updated: 2026-01-02T15:59:29.494Z
Status : Analyzed
Published: 2025-12-31T16:15:43.727
Modified: 2026-01-14T20:29:48.850
Link: CVE-2025-61037
No data.
OpenCVE Enrichment
No data.