Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-26230 PoC — Microsoft Windows Remote Access Connection Manager 安全漏洞

Source
Associated Vulnerability
Title:Microsoft Windows Remote Access Connection Manager 安全漏洞 (CVE-2024-26230)
Description:Microsoft Windows Remote Access Connection Manager是美国微软(Microsoft)公司的一项 Windows 服务,用于管理从您的计算机到 Internet 的虚拟专用网络 (VPN)连接,如果禁用此服务,VPN 客户端应用程序将无法启动。 Microsoft Windows Remote Access Connection Manager存在安全漏洞。攻击者利用该漏洞可以提升权限。以下产品和版本受到影响:Windows 10 Version 1809 f
Readme
# CVE-2024-26230


All credit goes to k0shl (@KeyZ3r0)! 

## Summary of Exploit

[A trick, the story of CVE-2024-26230](https://whereisk0shl.top/post/a-trick-the-story-of-cve-2024-26230)

## DISCLAIMER
The exploit is not stable, only use it for study purposes.
File Snapshot

[4.0K] /data/pocs/16e18403c3a098927a2d5935aa392969d0ea663e ├── [ 16K] CVE-2024-26230.cpp ├── [4.9K] CVE-2024-26230.h ├── [1.4K] CVE-2024-26230.sln ├── [6.8K] CVE-2024-26230.vcxproj ├── [1.7K] CVE-2024-26230.vcxproj.filters ├── [ 264] Header.h ├── [ 261] README.md ├── [1.5K] ServiceHelper.cpp ├── [ 598] ServiceHelper.h ├── [ 75] tapi.acf ├── [ 30K] tapi_c.c ├── [ 903] tapi.idl └── [ 29K] tapi_s.c 0 directories, 13 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.