Vulnerabilities
Vulnerable Software
V2rayl Project:  Security Vulnerabilities
v2rayL 2.1.3 allows local users to achieve root access because /etc/v2rayL/add.sh and /etc/v2rayL/remove.sh are owned by a low-privileged user but execute as root via Sudo.
CVSS Score
7.8
EPSS Score
0.0
Published
2020-03-15
v2rayL 2.1.3 allows local users to achieve root access because /etc/v2rayL/config.json is owned by a low-privileged user but contains commands that are executed as root, after v2rayL.service is restarted via Sudo.
CVSS Score
7.8
EPSS Score
0.0
Published
2020-03-15


Contact Us

Shodan ® - All rights reserved