Cyber Posture

CVE-2021-47790

HighPublic PoC

Published: 16 January 2026

Published
16 January 2026
Modified
30 January 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0001 0.3th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2021-47790 is a high-severity Unquoted Search Path or Element (CWE-428) vulnerability in Pysoft Active Webcam. Its CVSS base score is 7.8 (High).

Operationally, ranked at the 0.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 CM-6 (Configuration Settings) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces secure configuration settings for system services, directly preventing unquoted service path vulnerabilities by requiring properly quoted executable paths.

prevent

Requires timely identification, reporting, and remediation of flaws like the unquoted service path in Active WebCam 11.5 to eliminate the vulnerability.

prevent

Applies least privilege to services, reducing the impact of privilege escalation even if an attacker exploits the unquoted service path.

NVD Description

Active WebCam 11.5 contains an unquoted service path vulnerability that allows local attackers to execute arbitrary code with elevated system privileges. Attackers can exploit the misconfigured service path by placing malicious executables in specific directory locations to gain administrative access.

Deeper analysisAI

CVE-2021-47790 is an unquoted service path vulnerability in Active WebCam 11.5. This flaw stems from a misconfigured service path (CWE-428), enabling local attackers to execute arbitrary code with elevated system privileges by placing malicious executables in specific directory locations along the search path.

The vulnerability can be exploited by local attackers who already possess low privileges (PR:L), requiring low attack complexity (AC:L) and no user interaction (UI:N). Successful exploitation grants administrative access, with high impacts on confidentiality, integrity, and availability, as reflected in its CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

Advisories from VulnCheck (https://www.vulncheck.com/advisories/active-webcam-unquoted-service-path) and an exploit published on Exploit-DB (https://www.exploit-db.com/exploits/50273) document the issue, while the vendor site (https://www.pysoft.com/) and download pages like TechSpot (https://www.techspot.com/downloads/175-active-webcam.html) provide context on the affected software; no specific patches or mitigations are detailed in the referenced materials.

A public proof-of-concept exploit is available on Exploit-DB, indicating potential for real-world local privilege escalation on unpatched systems.

Details

CWE(s)

Affected Products

pysoft
active webcam
11.5

CVEs Like This One

CVE-2019-25276Shared CWE-428
CVE-2020-37098Shared CWE-428
CVE-2021-47809Shared CWE-428
CVE-2024-57276Shared CWE-428
CVE-2020-37100Shared CWE-428
CVE-2020-36976Shared CWE-428
CVE-2021-47787Shared CWE-428
CVE-2021-47833Shared CWE-428
CVE-2021-47861Shared CWE-428
CVE-2021-47896Shared CWE-428

References