<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Remote Sunrise Helper for Windows (2026.14) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/remote-sunrise-helper-for-windows-2026.14/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 15 May 2026 12:53:11 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/remote-sunrise-helper-for-windows-2026.14/feed.xml" rel="self" type="application/rss+xml"/><item><title>Remote Sunrise Helper for Windows 2026.14 Remote Code Execution Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-remote-sunrise-helper-rce/</link><pubDate>Fri, 15 May 2026 12:53:11 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-remote-sunrise-helper-rce/</guid><description>A remote code execution vulnerability exists in Remote Sunrise Helper for Windows version 2026.14, which can be exploited without authentication, as demonstrated by a public exploit published on Exploit-DB.</description><content:encoded><![CDATA[<p>A remote code execution vulnerability has been identified in Remote Sunrise Helper for Windows 2026.14. A public exploit (EDB-52565) demonstrating the vulnerability has been published on Exploit-DB, indicating a heightened risk for systems running the vulnerable software. The exploit targets the application&rsquo;s API endpoints to execute arbitrary commands on the host. Successful exploitation allows an unauthenticated attacker to execute commands on the targeted Windows system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Remote Sunrise Helper instance running on a Windows host.</li>
<li>The attacker sends a GET request to <code>/api/getVersion</code> to the target on port 49762 to verify the application version and check if authentication is disabled.</li>
<li>The application responds with a JSON object indicating the version and the value of <code>requires.auth</code>. If <code>requires.auth</code> is <code>False</code>, the system is vulnerable.</li>
<li>The attacker crafts a POST request to <code>/api/executeScript</code> with the <code>X-Script</code> header containing the command to execute.</li>
<li>The attacker sets the <code>X-HostName</code>, <code>X-ClientToken</code>, and <code>X-HostFullModel</code> headers.</li>
<li>The vulnerable application executes the command specified in the <code>X-Script</code> header.</li>
<li>The application returns the result of the executed command in JSON format.</li>
<li>The attacker gains remote code execution on the Windows host, potentially leading to further compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an unauthenticated attacker to execute arbitrary code on the affected Windows system. This could lead to complete system compromise, including data theft, installation of malware, or denial of service. The availability of a public exploit makes this vulnerability highly accessible to attackers.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply appropriate mitigations to prevent unauthorized access to port 49762 used by Remote Sunrise Helper.</li>
<li>Deploy the Sigma rule <code>Detect Remote Sunrise Helper Vulnerability Check</code> to identify systems potentially probing for the vulnerability.</li>
<li>Deploy the Sigma rule <code>Detect Remote Sunrise Helper Exploit</code> to detect exploit attempts against the <code>/api/executeScript</code> endpoint.</li>
<li>Monitor web server logs for POST requests to <code>/api/executeScript</code> with suspicious <code>X-Script</code> headers.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>remote-code-execution</category><category>exploit</category><category>windows</category></item><item><title>Remote Sunrise Helper for Windows 2026.14 - Unauthenticated File/Directory Listing</title><link>https://feed.craftedsignal.io/briefs/2026-05-remote-sunrise-helper-file-listing/</link><pubDate>Fri, 15 May 2026 12:52:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-remote-sunrise-helper-file-listing/</guid><description>A local exploit has been published for Remote Sunrise Helper for Windows 2026.14, detailing an unauthenticated file/directory listing vulnerability. Successful exploitation allows unauthenticated attackers to list files and directories on the affected system.</description><content:encoded><![CDATA[<p>A public exploit has been published on Exploit-DB (EDB-52566) detailing an unauthenticated file/directory listing vulnerability in Remote Sunrise Helper for Windows 2026.14. The vulnerable software exposes an API endpoint <code>/api/listFiles</code> which can be accessed without authentication to list directory contents on the target Windows system. The exploit leverages HTTP GET requests to this endpoint, potentially allowing attackers to enumerate sensitive files and directories. The availability of this exploit increases the risk to systems running the affected version of Remote Sunrise Helper.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a target system running Remote Sunrise Helper for Windows 2026.14 on port 49762.</li>
<li>The attacker crafts an HTTP GET request to <code>https://&lt;target_ip&gt;:49762/api/getVersion</code> to determine if authentication is required.</li>
<li>If the response indicates that authentication is not required ( <code>&quot;requires.auth&quot;: False</code>), the attacker proceeds to the next step.</li>
<li>The attacker crafts an HTTP GET request to <code>https://&lt;target_ip&gt;:49762/api/listFiles</code> with the <code>X-HostName</code>, <code>X-ClientToken</code>, and <code>X-HostFullModel</code> headers set to arbitrary values.</li>
<li>To list a specific directory, the attacker URL-encodes the path and includes it in the request to <code>https://&lt;target_ip&gt;:49762/api/listFiles=&lt;encoded_path&gt;</code>.</li>
<li>The server responds with a JSON payload containing a list of files and directories within the requested path.</li>
<li>The attacker parses the JSON response to enumerate files and directories on the target system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an unauthenticated attacker to list files and directories on the Windows system running Remote Sunrise Helper 2026.14. This information can be used to discover sensitive information, identify potential targets for further exploitation, or gather intelligence about the system&rsquo;s configuration. The impact is information disclosure, potentially leading to further compromise of the affected system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply appropriate access controls or remove the affected software.</li>
<li>Monitor webserver logs for requests to the <code>/api/listFiles</code> endpoint from unusual source IPs, as detailed in the overview.</li>
<li>Deploy the Sigma rule to detect unauthenticated access to the <code>/api/listFiles</code> endpoint as outlined below.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>unauthenticated-access</category><category>file-listing</category><category>windows</category></item></channel></rss>