### [CVE-2018-6546](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6546) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description plays_service.exe in the plays.tv service before 1.27.7.0, as distributed in AMD driver-installation packages and Gaming Evolved products, executes code at a user-defined (local or SMB) path as SYSTEM when the execute_installer parameter is used in an HTTP message. This occurs without properly authenticating the user. ### POC #### Reference - https://github.com/securifera/CVE-2018-6546-Exploit/ - https://github.com/securifera/CVE-2018-6546-Exploit/ - https://www.exploit-db.com/exploits/44476/ - https://www.exploit-db.com/exploits/44476/ - https://www.securifera.com/advisories/CVE-2018-6546/ - https://www.securifera.com/advisories/CVE-2018-6546/ #### Github - https://github.com/0xT11/CVE-POC - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub - https://github.com/securifera/CVE-2018-6546-Exploit