WiFi Mouse 1.8.3.4 Remote Code Execution

Discussion in 'News Aggregator' started by Packet Storm, 27 Sep 2022.

  1. Packet Storm

    Packet Storm Guest

    The WiFi Mouse (Mouse Server) from Necta LLC contains an authentication bypass as the authentication is completely implemented entirely on the client side. By utilizing this vulnerability, is possible to open a program on the server (cmd.exe in our case) and type commands that will be executed as the user running WiFi Mouse (Mouse Server), resulting in remote code execution. Tested against versions 1.8.3.4 (current as of module writing) and 1.8.2.3.

    Continue reading...
     

Share This Page

Loading...