Altec DocLink (now maintained by Beyond Limits Inc.) version 4.0.336.0 exposes insecure .NET Remoting endpoints over TCP and HTTP/SOAP via Altec.RDCHostService.exe using the ObjectURI "doclinkServer.soap". The service does not require authentication and is vulnerable to unsafe object unmarshalling, allowing remote attackers to read arbitrary files from the underlying system by specifying local file paths. Additionally, attackers can coerce SMB authentication via UNC paths and write arbitrary files to server locations. Because writable paths may be web-accessible under IIS, this can result in unauthenticated remote code execution or denial of service through file overwrite.

Project Subscriptions

Vendors Products
Altec Doclink Subscribe
Beyond Limits Subscribe
Altec Doclink Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 27 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 27 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Beyond
Beyond altec Doclink
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:beyond:altec_doclink:4.0.336.0:*:*:*:*:*:*:*
Vendors & Products Beyond
Beyond altec Doclink
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Wed, 25 Feb 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Beyond Limits
Beyond Limits altec Doclink
Vendors & Products Beyond Limits
Beyond Limits altec Doclink

Tue, 24 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Description Altec DocLink (now maintained by Beyond Limits Inc.) version 4.0.336.0 exposes insecure .NET Remoting endpoints over TCP and HTTP/SOAP via Altec.RDCHostService.exe using the ObjectURI "doclinkServer.soap". The service does not require authentication and is vulnerable to unsafe object unmarshalling, allowing remote attackers to read arbitrary files from the underlying system by specifying local file paths. Additionally, attackers can coerce SMB authentication via UNC paths and write arbitrary files to server locations. Because writable paths may be web-accessible under IIS, this can result in unauthenticated remote code execution or denial of service through file overwrite.
Title DocLink .NET Remoting Unauthenticated Arbitrary File Read/Write RCE
Weaknesses CWE-502
CWE-918
References
Metrics cvssV4_0

{'score': 10, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-02-27T20:53:32.186Z

Reserved: 2026-02-11T20:08:07.945Z

Link: CVE-2026-26222

cve-icon Vulnrichment

Updated: 2026-02-27T20:53:28.836Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-24T18:29:33.293

Modified: 2026-02-27T20:05:06.970

Link: CVE-2026-26222

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-02-25T11:35:50Z