HomeIntelligenceBrief
VULNERABILITY BRIEF🟠 High Vulnerability

Unauthenticated File/Directory Listing Vulnerability in Remote Sunrise Helper for Windows 2026.14 Exposes System Files

A new exploit (EDB‑52566) shows that Remote Sunrise Helper 2026.14 on Windows allows anyone to list files and directories via an unauthenticated API call. The flaw can reveal sensitive configuration data and serve as a stepping‑stone for further compromise, making it a critical TPRM concern for any vendor using this tool.

LiveThreat™ Intelligence · 📅 May 16, 2026· 📰 exploit-db.com
🟠
Severity
High
VU
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
4 recommended
📰
Source
exploit-db.com

Unauthenticated File/Directory Listing Vulnerability in Remote Sunrise Helper for Windows 2026.14 Exposes System Files

What Happened – A publicly‑available exploit (EDB‑52566) demonstrates that the Remote Sunrise Helper service (version 2026.14) on Windows 10/11 allows anyone to query the /api/listFiles endpoint without authentication, returning a JSON‑encoded directory listing.

Why It Matters for TPRM

  • Unauthenticated enumeration can reveal sensitive configuration files, credential stores, or proprietary data on third‑party systems.
  • Attackers can use the listing as a foothold for deeper lateral movement or ransomware deployment.
  • Vendors that embed Remote Sunrise Helper in their managed‑service stacks inherit this exposure, expanding the attack surface of their clients.

Who Is Affected – Organizations across all sectors that deploy Remote Sunrise Helper (commonly used by MSPs, IT service desks, and internal support teams).

Recommended Actions

  • Verify whether Remote Sunrise Helper 2026.14 is in use across your vendor ecosystem.
  • Apply the vendor‑released patch or upgrade to a version that enforces authentication on the API.
  • If patching is not immediate, block inbound traffic to TCP 49762 and restrict outbound calls to the helper service.
  • Conduct a file‑system audit on affected hosts to ensure no sensitive data was accessed.

Technical Notes – The exploit sends a GET request to https://<target>:49762/api/listFiles (optionally with a URL‑encoded path). The service returns a JSON array of file names when the requires.auth flag is false. No CVE has been assigned yet. The vulnerability stems from a missing authentication check (misconfiguration) in the helper’s REST API. Source: Exploit‑DB 52566

📰 Original Source
https://www.exploit-db.com/exploits/52566

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.