Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| BeyondTrust | Remote Support(RS) & Privileged Remote Access(PRA) | 0 ~ RS 25.3.1 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | BeyondTrust Remote Support is vulnerable to unauthenticated remote code execution via the WebSocket endpoint /nw. An attacker can extract the company identifier from the /get_mech_list endpoint and use it to connect to the WebSocket service, then inject OS commands through the binary WebSocket payload that are executed on the server. | https://github.com/projectdiscovery/nuclei-templates/blob/main/javascript/cves/2026/CVE-2026-1731.yaml | POC Details |
| 2 | CVE-2026-1731 - Critical command injection vulnerability in BeyondTrust Remote Support and Privileged Remote Access due to unsafe Bash arithmetic evaluation in a WebSocket-reachable script | https://github.com/win3zz/CVE-2026-1731 | POC Details |
| 3 | Passive vulnerability scanner for CVE-2026-1731 — BeyondTrust RS/PRA pre-auth RCE (CVSS 9.9). Educational & defensive use only. | https://github.com/cybrdude/cve-2026-1731-scanner | POC Details |
| 4 | CVE-2026-1731 PoC | https://github.com/jakubie07/CVE-2026-1731 | POC Details |
| 5 | None | https://github.com/richardpaimu34/CVE-2026-1731 | POC Details |
| 6 | CVE-2026-1731 — BeyondTrust Remote Code Execution Vulnerability | https://github.com/hexissam/CVE-2026-1731 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet