Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2026-1731
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Remote code execution vulnerability in BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA)
Source: NVD (National Vulnerability Database)
Vulnerability Description
BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability. By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
BeyondTrust Remote Support和BeyondTrust Privileged Remote Access 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
BeyondTrust Remote Support和BeyondTrust Privileged Remote Access(BeyondTrust PRA)都是美国BeyondTrust公司的产品。BeyondTrust Remote Support是一个适用于 Windows、Mac、Linux、Ios(iPad、iPhone)等的远程桌面访问、服务台和协作软件。BeyondTrust Privileged Remote Access是一款特权远程访问软件。 BeyondTrust Remote S
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
BeyondTrustRemote Support(RS) & Privileged Remote Access(PRA) 0 ~ RS 25.3.1 -
II. Public POCs for CVE-2026-1731
#POC DescriptionSource LinkShenlong Link
1BeyondTrust Remote Support is vulnerable to unauthenticated remote code execution via the WebSocket endpoint /nw. An attacker can extract the company identifier from the /get_mech_list endpoint and use it to connect to the WebSocket service, then inject OS commands through the binary WebSocket payload that are executed on the server. https://github.com/projectdiscovery/nuclei-templates/blob/main/javascript/cves/2026/CVE-2026-1731.yamlPOC Details
2CVE-2026-1731 - Critical command injection vulnerability in BeyondTrust Remote Support and Privileged Remote Access due to unsafe Bash arithmetic evaluation in a WebSocket-reachable scripthttps://github.com/win3zz/CVE-2026-1731POC Details
3Passive vulnerability scanner for CVE-2026-1731 — BeyondTrust RS/PRA pre-auth RCE (CVSS 9.9). Educational & defensive use only.https://github.com/cybrdude/cve-2026-1731-scannerPOC Details
4CVE-2026-1731 PoChttps://github.com/jakubie07/CVE-2026-1731POC Details
5Nonehttps://github.com/richardpaimu34/CVE-2026-1731POC Details
6CVE-2026-1731 — BeyondTrust Remote Code Execution Vulnerabilityhttps://github.com/hexissam/CVE-2026-1731POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2026-1731
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2026-1731

No comments yet


Leave a comment