Unrated severityNVD Advisory· Published Dec 22, 2025· Updated Jan 3, 2026
Zillya Total Security 3.0.2367.0 Local Privilege Escalation via Quarantine Module
CVE-2023-53973
Description
Zillya Total Security 3.0.2367.0 contains a privilege escalation vulnerability that allows low-privileged users to copy files to unauthorized system locations using the quarantine module. Attackers can leverage symbolic link techniques to restore quarantined files to restricted directories, potentially enabling system-level access through techniques like DLL hijacking.
Affected products
2- Range: = 3.0.2367.0
- Zillya/Zillya Total Securityv5Range: 3.0.2367.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- www.exploit-db.com/exploits/51151mitreexploit
- www.vulncheck.com/advisories/zillya-total-security-local-privilege-escalation-via-quarantine-modulemitrethird-party-advisory
- zillya.commitreproduct
News mentions
0No linked articles in our index yet.