CVE-2010-0103
Energizer Duo Usb - Code Injection
Title source: ruleDescription
UsbCharger.dll in the Energizer DUO USB battery charger software contains a backdoor that is implemented through the Arucer.dll file in the %WINDIR%\system32 directory, which allows remote attackers to download arbitrary programs onto a Windows PC, and execute these programs, via a request to TCP port 7777.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16390
metasploit
SCANNER
rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/backdoor/energizer_duo_detect.rb
metasploit
WORKING POC
EXCELLENT
by hdm · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/backdoor/energizer_duo_payload.rb
References (4)
Scores
EPSS
0.7678
EPSS Percentile
99.0%
Details
CWE
CWE-94
Status
published
Products (1)
energizer/duo_usb
Published
Mar 10, 2010
Tracked Since
Feb 18, 2026