CVE-2011-10028

The RealNetworks RealArcade platform includes an ActiveX control (InstallerDlg.dll, version 2.6.0.445) that exposes a method named Exec via the StubbyUtil.ProcessMgr COM object. This method allows remote attackers to execute arbitrary commands on a victim's Windows machine without proper validation or restrictions. This platform was sometimes referred to or otherwise known as RealArcade or Arcade Games and has since consolidated with RealNetworks' platform, GameHouse.
CVSS

No CVSS.

Configurations

No configuration.

History

21 Aug 2025, 18:15

Type Values Removed Values Added
References () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/browser/real_arcade_installerdlg.rb - () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/browser/real_arcade_installerdlg.rb -
References () https://www.exploit-db.com/exploits/17105 - () https://www.exploit-db.com/exploits/17105 -
References () https://www.exploit-db.com/exploits/17149 - () https://www.exploit-db.com/exploits/17149 -
Summary
  • (es) La plataforma RealNetworks RealArcade incluye un control ActiveX (InstallerDlg.dll, versión 2.6.0.445) que expone un método llamado Exec mediante el objeto COM StubbyUtil.ProcessMgr. Este método permite a atacantes remotos ejecutar comandos arbitrarios en el equipo Windows de la víctima sin la validación ni las restricciones adecuadas. Esta plataforma se conocía en ocasiones como RealArcade o Arcade Games y, desde entonces, se ha fusionado con la plataforma de RealNetworks, GameHouse.

20 Aug 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-20 16:15

Updated : 2025-08-22 18:09


NVD link : CVE-2011-10028

Mitre link : CVE-2011-10028

CVE.ORG link : CVE-2011-10028


JSON object : View

Products Affected

No product.

CWE
CWE-623

Unsafe ActiveX Control Marked Safe For Scripting