CVE-2025-63421
Description
An issue in filosoft Comerc.32 Commercial Invoicing v.16.0.0.3 allows a local attacker to execute arbitrary code via the comeinst.exe file
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Local attacker can replace a temporary setup.exe during installation, leading to arbitrary code execution when the victim uninstalls the software.
Vulnerability
Overview
CVE-2025-63421 is a local privilege escalation vulnerability in Filosoft Comerc.32 Commercial Invoicing v.16.0.0.3. During installation via comeinst.exe, the installer drops a file named setup.exe into a temporary folder under C:\Users\\AppData\Local\Temp\{random-UID}\Disk1\. Because the user has write permissions on this folder, an attacker with local access can replace the legitimate setup.exe with a malicious binary before the installation process finishes [1].
Exploitation
The attacker must be able to write to the temporary folder, which is accessible with a low integrity token or without an administrator shell. The installer does not validate the integrity of setup.exe before copying it to the final installation directory at C:\Program Files (x86)\InstallShield Installation Information\{random-uid}\setup.exe. When the victim later uninstalls the program via the Control Panel, the malicious setup.exe is executed. The uninstall process triggers a UAC elevation, which partially obfuscates the backdoor execution and can allow lateral movement depending on the user context [1].
Impact
Successful exploitation allows a local attacker to execute arbitrary code with elevated privileges during the uninstall process. This can lead to full system compromise of the affected system and potential lateral movement within a network [1].
Mitigation
As of the publication date, no official patch has been announced by Filosoft [2]. Users should restrict local access to trusted users and monitor the temporary folder during software installations. The vendor's website does not mention a fix [2].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: 16.0.0.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.