Cyber Posture

CVE-2021-47833

HighPublic PoC

Published: 16 January 2026

Published
16 January 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0001 0.4th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2021-47833 is a high-severity Unquoted Search Path or Element (CWE-428) vulnerability in Gearboxcomputers (inferred from references). Its CVSS base score is 7.8 (High).

Operationally, ranked at the 0.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 CM-6 (Configuration Settings) and CM-7 (Least Functionality).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the unquoted service path flaw in WifiHotSpotService.exe through timely patching, reconfiguration, or removal to prevent local privilege escalation.

prevent

Enforces secure configuration settings for services, including proper quoting of executable paths to block hijacking during startup or reboot.

prevent

Restricts system to least functionality by prohibiting or disabling unnecessary services like WifiHotSpot, eliminating the vulnerable service path entirely.

NVD Description

WifiHotSpot 1.0.0.0 contains an unquoted service path vulnerability in its WifiHotSpotService.exe that allows local attackers to execute code with elevated privileges. Attackers can exploit the unquoted path during system startup or reboot to inject and run malicious executables with LocalSystem…

more

permissions.

Deeper analysisAI

CVE-2021-47833 is an unquoted service path vulnerability in WifiHotSpot version 1.0.0.0, affecting the WifiHotSpotService.exe service. This issue, mapped to CWE-428, enables local privilege escalation and carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). The vulnerability stems from the service's executable path not being properly quoted, allowing attackers to hijack execution under elevated privileges.

Local attackers with low-privilege access (PR:L) can exploit the unquoted path by placing a malicious executable in a directory traversed during service startup or system reboot. Successful exploitation executes the attacker's code with LocalSystem permissions, granting high confidentiality, integrity, and availability impacts (C:H/I:H/A:H) without requiring user interaction.

Advisories such as the VulnCheck report at https://www.vulncheck.com/advisories/wifihotspot-wifihotspotserviceexe-unquoted-service-path provide further details on the flaw, while a proof-of-concept exploit is publicly available at https://www.exploit-db.com/exploits/49845. Security practitioners should consult these resources and the vendor site at https://wifi-hotspot.gearboxcomputers.com/ for any recommended mitigations, such as service reconfiguration or software updates.

Details

CWE(s)

Affected Products

Gearboxcomputers
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2019-25276Shared CWE-428
CVE-2020-37098Shared CWE-428
CVE-2021-47809Shared CWE-428
CVE-2024-57276Shared CWE-428
CVE-2020-37100Shared CWE-428
CVE-2021-47790Shared CWE-428
CVE-2020-36976Shared CWE-428
CVE-2021-47787Shared CWE-428
CVE-2021-47861Shared CWE-428
CVE-2021-47896Shared CWE-428

References