VYPR
High severity7.8NVD Advisory· Published Feb 12, 2026· Updated Apr 15, 2026

CVE-2025-63421

CVE-2025-63421

Description

An issue in filosoft Comerc.32 Commercial Invoicing v.16.0.0.3 allows a local attacker to execute arbitrary code via the comeinst.exe file

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Local attacker can replace a temporary setup.exe during installation, leading to arbitrary code execution when the victim uninstalls the software.

Vulnerability

Overview

CVE-2025-63421 is a local privilege escalation vulnerability in Filosoft Comerc.32 Commercial Invoicing v.16.0.0.3. During installation via comeinst.exe, the installer drops a file named setup.exe into a temporary folder under C:\Users\\AppData\Local\Temp\{random-UID}\Disk1\. Because the user has write permissions on this folder, an attacker with local access can replace the legitimate setup.exe with a malicious binary before the installation process finishes [1].

Exploitation

The attacker must be able to write to the temporary folder, which is accessible with a low integrity token or without an administrator shell. The installer does not validate the integrity of setup.exe before copying it to the final installation directory at C:\Program Files (x86)\InstallShield Installation Information\{random-uid}\setup.exe. When the victim later uninstalls the program via the Control Panel, the malicious setup.exe is executed. The uninstall process triggers a UAC elevation, which partially obfuscates the backdoor execution and can allow lateral movement depending on the user context [1].

Impact

Successful exploitation allows a local attacker to execute arbitrary code with elevated privileges during the uninstall process. This can lead to full system compromise of the affected system and potential lateral movement within a network [1].

Mitigation

As of the publication date, no official patch has been announced by Filosoft [2]. Users should restrict local access to trusted users and monitor the temporary folder during software installations. The vendor's website does not mention a fix [2].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.