### [CVE-2022-2313](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2313) ![](https://img.shields.io/static/v1?label=Product&message=Trellix%20Agent%20(TA)&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3C%205.7.7%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-%20427%3A%20Uncontrolled%20Search%20Path%20Element&color=brighgreen) ### Description A DLL hijacking vulnerability in the MA Smart Installer for Windows prior to 5.7.7, which allows local users to execute arbitrary code and obtain higher privileges via careful placement of a malicious DLL into the folder from where the Smart installer is being executed. ### POC #### Reference - https://kcm.trellix.com/corporate/index?page=content&id=SB10385&actp=null&viewlocale=en_US&showDraft=false&platinum_status=false&locale=en_US #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/ExpLangcn/FuYao-Go