Overview
This report details a critical vulnerability, CVE-2025-10941, in the Topaz SERVCore Teller application, which impacts versions 2.14.0-RC2/2.14.1. The vulnerability lies in the SERVCoreTeller_2.0.40D.msi component and can be exploited to gain unauthorized access to the system, leading to potential data leakage or system compromise. Given the severity of the vulnerability, it’s crucial for users and administrators to understand its implications and take immediate steps to mitigate the risk.
Vulnerability Summary
CVE ID: CVE-2025-10941
Severity: High (7.8 CVSS Score)
Attack Vector: Local
Privileges Required: None
User Interaction: None
Impact: Unauthorized access, potential system compromise or data leakage
Affected Products
Escape the Surveillance Era
Most apps won’t tell you the truth.
They’re part of the problem.
Phone numbers. Emails. Profiles. Logs.
It’s all fuel for surveillance.
Ameeba Chat gives you a way out.
- • No phone number
- • No email
- • No personal info
- • Anonymous aliases
- • End-to-end encrypted
Chat without a trace.
Product | Affected Versions
Topaz SERVCore Teller | 2.14.0-RC2/2.14.1
How the Exploit Works
The vulnerability exists in the file SERVCoreTeller_2.0.40D.msi of the installer component. It allows a local user to execute manipulations that lead to permission issues. The root cause of the vulnerability is the now deprecated “nssm” service, which was used by earlier versions of the application’s installer.
Conceptual Example Code
In this conceptual example, a local user might exploit the vulnerability by executing a malicious command that manipulates the SERVCoreTeller_2.0.40D.msi file. Below is a hypothetical example:
C:\> nssm set SERVCoreTeller_2.0.40D.msi AppDirectory "C:\malicious_directory"
C:\> nssm start SERVCoreTeller_2.0.40D.msi
This shell command sets the application directory of the SERVCoreTeller_2.0.40D.msi service to a malicious directory and starts the service, effectively granting the attacker unauthorized access to the system.
Mitigation Guidance
The vendor has already patched this vulnerability by removing the use of “nssm” in the latest version of the installer. Therefore, users are strongly advised to upgrade to the latest version of Topaz SERVCore Teller. As a temporary mitigation, users can also implement a web application firewall (WAF) or an intrusion detection system (IDS) to detect and prevent potential exploitation of this vulnerability.

