Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-26230 PoC — Windows Telephony Server Elevation of Privilege Vulnerability

Source
Associated Vulnerability
Title:Windows Telephony Server Elevation of Privilege Vulnerability (CVE-2024-26230)
Description:Windows Telephony Server Elevation of Privilege Vulnerability
Readme
# CVE-2024-26230


All credit goes to k0shl (@KeyZ3r0)! 

## Summary of Exploit

[A trick, the story of CVE-2024-26230](https://whereisk0shl.top/post/a-trick-the-story-of-cve-2024-26230)

## DISCLAIMER
The exploit is not stable, only use it for study purposes.
File Snapshot

[4.0K] /data/pocs/16e18403c3a098927a2d5935aa392969d0ea663e ├── [ 16K] CVE-2024-26230.cpp ├── [4.9K] CVE-2024-26230.h ├── [1.4K] CVE-2024-26230.sln ├── [6.8K] CVE-2024-26230.vcxproj ├── [1.7K] CVE-2024-26230.vcxproj.filters ├── [ 264] Header.h ├── [ 261] README.md ├── [1.5K] ServiceHelper.cpp ├── [ 598] ServiceHelper.h ├── [ 75] tapi.acf ├── [ 30K] tapi_c.c ├── [ 903] tapi.idl └── [ 29K] tapi_s.c 0 directories, 13 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →