Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-26230 PoC — Microsoft Windows Remote Access Connection Manager 安全漏洞

Source
Associated Vulnerability
Title:Microsoft Windows Remote Access Connection Manager 安全漏洞 (CVE-2024-26230)
Description:Microsoft Windows Remote Access Connection Manager是美国微软(Microsoft)公司的一项 Windows 服务,用于管理从您的计算机到 Internet 的虚拟专用网络 (VPN)连接,如果禁用此服务,VPN 客户端应用程序将无法启动。 Microsoft Windows Remote Access Connection Manager存在安全漏洞。攻击者利用该漏洞可以提升权限。以下产品和版本受到影响:Windows 10 Version 1809 f
Description
LPE of CVE-2024-26230
Readme
参考k0shl 师傅的blog,感谢k0shl 师傅的帮助
File Snapshot

[4.0K] /data/pocs/b938712d18ae3249e775185d02418e2e46b32a84 ├── [4.0K] exp │   ├── [7.6K] exp.cpp │   ├── [ 982] RpcHelper.h │   ├── [ 76] tapsrv.acf │   ├── [ 31K] tapsrv_c.c │   ├── [2.5K] tapsrv_h.h │   ├── [1.3K] tapsrv.idl │   └── [ 30K] tapsrv_s.c ├── [4.0K] imgs │   ├── [298K] 1.jpg │   ├── [ 90K] 2.jpg │   ├── [212K] 3.jpg │   ├── [151K] 4.jpg │   ├── [283K] 5.jpg │   ├── [ 45K] 6.jpg │   └── [314K] 7.jpg ├── [ 55] README.md └── [4.0K] vulnerable-tapisrv-version └── [300K] tapisrv.dll 3 directories, 16 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.