CVE-2020-10589
15.03.2020, 21:15
v2rayL 2.1.3 allows local users to achieve root access because /etc/v2rayL/config.json is owned by a low-privileged user but contains commands that are executed as root, after v2rayL.service is restarted via Sudo.Enginsight
Vendor | Product | Version |
---|---|---|
v2rayl_project | v2rayl | 2.1.3 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration