CVE-2022-50901
Published: 13 January 2026
Summary
CVE-2022-50901 is a high-severity Unquoted Search Path or Element (CWE-428) vulnerability in Wondershare Dr.Fone. Its CVSS base score is 8.4 (High).
Operationally, ranked at the 3.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 CM-6 (Configuration Settings) and RA-5 (Vulnerability Monitoring and Scanning).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces secure configuration settings for services, including properly quoting executable paths to directly prevent hijacking via unquoted service paths in DFWSIDService.
Mandates identification, reporting, and correction of flaws like the unquoted service path in Wondershare Dr.Fone, preventing exploitation through timely remediation.
Vulnerability scanning detects unquoted service path issues such as CVE-2022-50901 in DFWSIDService, enabling proactive remediation.
NVD Description
Wondershare Dr.Fone 11.4.9 contains an unquoted service path vulnerability in the DFWSIDService that allows local users to potentially execute arbitrary code. Attackers can exploit the unquoted path in C:\Program Files (x86)\Wondershare\Wondershare Dr.Fone\ to inject malicious executables that would run with…
more
LocalSystem privileges.
Deeper analysisAI
CVE-2022-50901 is an unquoted service path vulnerability in Wondershare Dr.Fone version 11.4.9, specifically affecting the DFWSIDService. The issue arises from an unquoted path in C:\Program Files (x86)\Wondershare\Wondershare Dr.Fone\, enabling local users to potentially execute arbitrary code. It carries a CVSS score of 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and maps to CWE-428.
Local attackers can exploit this vulnerability by injecting malicious executables into directories parsed before the legitimate service binary due to the unquoted path. No privileges are required (PR:N), and exploitation allows arbitrary code execution with LocalSystem privileges, resulting in high impacts on confidentiality, integrity, and availability.
Advisories and related resources, including a proof-of-concept exploit, are detailed at https://www.exploit-db.com/exploits/50755 and https://www.vulncheck.com/advisories/wondershare-drfone-dfwsidservice-unquoted-service-path, with the vendor site at https://www.wondershare.com/.
Details
- CWE(s)