{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreieryqsp2mql4btjo2kmjt2d4dqxtqbeui3qa4a4rcdyf3rrlhda2a",
"uri": "at://did:plc:6wtxqaikjf62unmnajbfbq5v/app.bsky.feed.post/3meyxjhkqs4h2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreiedjjlkdocut22v7viixs7bkbfmumdtqrgi267uzaxxo2pbq56v7m"
},
"mimeType": "image/jpeg",
"size": 80430
},
"path": "/beyondtrust-cve-2026-1731-actively-exploited-for-domain-takeover/",
"publishedAt": "2026-02-16T19:46:52.000Z",
"site": "https://vpncentral.com",
"tags": [
"News",
"BeyondTrust CVE-2026-1731 Actively Exploited for Domain Takeover",
"VPN Central"
],
"textContent": "Attackers exploit a critical BeyondTrust vulnerability, CVE-2026-1731, in the wild to run OS commands and seize full domain control. This unauthenticated flaw hits self-hosted Remote Support (RS) and Privileged Remote Access (PRA) deployments via crafted HTTP requests. The issue scores 9.8 on CVSS. It lets remote actors execute code under site user privileges without login. […]\n\nThe post BeyondTrust CVE-2026-1731 Actively Exploited for Domain Takeover appeared first on VPN Central.",
"title": "BeyondTrust CVE-2026-1731 Actively Exploited for Domain Takeover"
}