Through a little known command line argument, applications that are are developed using the Qt5 graphical user interface framework can be exposed to a remote code execution vulnerability. The platform pluginpath command is used to load specially crafted DLL programs that get loaded by the framework to extend its functionality. This means that if an attacker hosts a malicious DLL on a remote UNC share, they can remote load the DLL and execute it. In order to mitigate this type of exploit, applications need to sanitize the arguments so that remote shares are stripped or the platform plugin argument is removed.
Source: https://www.bleepingcomputer.com/news/security/qt5-based-gui-apps-susceptible-to-remote-code-execution/

