The specific flaw exists within the Transfer File feature. By uploading a symbolic link, an attacker can abuse the service to read arbitrary files. An attacker can leverage this vulnerability to disclose information in the context of SYSTEM. Was ZDI-CAN-27909.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 24 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Feb 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rustdesk
Rustdesk client For Windows |
|
| Vendors & Products |
Rustdesk
Rustdesk client For Windows |
Fri, 20 Feb 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | RustDesk Client for Windows Transfer File Link Following Information Disclosure Vulnerability. This vulnerability allows local attackers to disclose sensitive information on affected installations of RustDesk Client for Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Transfer File feature. By uploading a symbolic link, an attacker can abuse the service to read arbitrary files. An attacker can leverage this vulnerability to disclose information in the context of SYSTEM. Was ZDI-CAN-27909. | |
| Title | RustDesk Client for Windows Transfer File Link Following Information Disclosure Vulnerability | |
| Weaknesses | CWE-59 | |
| References |
| |
| Metrics |
cvssV3_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: zdi
Published:
Updated: 2026-02-24T15:16:07.584Z
Reserved: 2026-02-13T21:13:34.414Z
Link: CVE-2026-2490
Updated: 2026-02-24T15:16:02.686Z
Status : Awaiting Analysis
Published: 2026-02-20T23:16:05.300
Modified: 2026-02-23T18:13:53.397
Link: CVE-2026-2490
No data.
OpenCVE Enrichment
Updated: 2026-02-23T14:33:38Z