Windows RRAS Remote Code Execution Vulnerability (CVE-2026-26111) - SE-RCE Exploit

2026.03.21
Credit: nu11secur1ty
Risk: High
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

# Titles: Windows RRAS Remote Code Execution Vulnerability (CVE-2026-26111) - SE-RCE Exploit # Author: nu11secur1ty # Date: 19.03.2026 # Vendor: Microsoft # Software: Windows RRAS (Routing and Remote Access Service) # Reference: https://www.cve.org/CVERecord?id=CVE-2026-26111 ## Description: A critical remote code execution vulnerability exists in the Microsoft Windows Routing and Remote Access Service (RRAS). The vulnerability is caused by an integer overflow (CWE-190) leading to a heap-based buffer overflow (CWE-122) when parsing specially crafted RPC responses. An authenticated domain user connecting to a malicious RRAS server can trigger this vulnerability, allowing the attacker to execute arbitrary code on the target system with high privileges. The CVSS score is 8.8 (HIGH) with vector AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. STATUS: CRITICAL - PATCHED BY MICROSOFT (KB5084597) [+]Payload: The payload consists of XOR-obfuscated shellcode (key 0xAA) embedded in a malformed RPC response with a length field set to 0xFFFFFFFF. This triggers the integer overflow and allows the shellcode to execute on the target system. The shellcode performs system information enumeration and exfiltrates data back to the attacker on port 4445. Example payload structure: - RPC Header (0x05 0x00 0x0b 0x03 0x10) - Integer Overflow Trigger (0xFFFFFFFF) - XOR-obfuscated shellcode (generated with msfvenom) - NOP sled (0x90 padding) # Reproduce: [href](https://github.com/nu11secur1ty/Windows11Exploits/tree/main/2026/CVE-2026-26111) # Demo: [href](https://www.patreon.com/posts/windows-rras-cve-153417054) # Time spent: 02:45:00 -- System Administrator - Infrastructure Engineer Penetration Testing Engineer Exploit developer at https://packetstormsecurity.com/ https://cve.mitre.org/index.html https://cxsecurity.com/ and https://www.exploit-db.com/ home page: https://www.asc3t1c-nu11secur1ty.com/ hiPEnIMR0v7QCo/+SEH9gBclAAYWGnPoBIQ75sCj60E= nu11secur1ty <https://www.asc3t1c-nu11secur1ty.com/>


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2026, cxsecurity.com

 

Back to Top