# CVE-2020-7283 Exploit
The write up can be found in the blog of the RedyOps Labs:
https://labs.redyops.com/index.php/2020/07/14/mcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283/
### Third Party Tools
This exploit code, is heavily based on symboliclink-testing-tools which was Developed by James Forshaw. The symboliclink-testing-tools can be found here:
https://github.com/googleprojectzero/symboliclink-testing-tools
[4.0K] /data/pocs/ad66ba295f906fc9aea1798f2db7e2fc085ef972
├── [ 11M] PoC.mkv
├── [ 450] README.md
└── [4.0K] src
├── [4.0K] CommonUtils
│ ├── [3.7K] CommonUtils.cpp
│ ├── [1.0K] CommonUtils.h
│ ├── [4.8K] CommonUtils.vcxproj
│ ├── [2.7K] CommonUtils.vcxproj.filters
│ ├── [2.0K] DirectoryObject.cpp
│ ├── [4.5K] FileOpLock.cpp
│ ├── [ 789] FileOpLock.h
│ ├── [5.0K] FileSymlink.cpp
│ ├── [ 588] FileSymlink.h
│ ├── [1.6K] Hardlink.cpp
│ ├── [2.0K] NativeSymlink.cpp
│ ├── [2.2K] ntimports.h
│ ├── [5.2K] RegistrySymlink.cpp
│ ├── [ 13K] ReparsePoint.cpp
│ ├── [1.2K] ReparsePoint.h
│ ├── [1.8K] ScopedHandle.cpp
│ ├── [ 498] ScopedHandle.h
│ ├── [ 298] stdafx.cpp
│ ├── [ 270] stdafx.h
│ ├── [ 314] targetver.h
│ └── [1.3K] typed_buffer.h
├── [4.0K] Exploit
│ ├── [2.4K] Exploit.cpp
│ ├── [1.2K] Exploit.filters
│ ├── [5.0K] Exploit.vcxproj
│ ├── [ 300] stdafx.cpp
│ ├── [ 462] stdafx.h
│ └── [ 314] targetver.h
└── [1.5K] McAfee Total Protection 16.0 R23.sln
3 directories, 30 files