Due to a reliance on client-side authentication, the WiFi Mouse (Mouse Server) from Necta LLC's authentication mechanism is trivially bypassed, which can result in remote code execution.
References
Configurations
History
21 Nov 2024, 07:19
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/168509/WiFi-Mouse-1.8.3.4-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://github.com/H4rk3nz0/PenTesting/blob/main/Exploits/wifi%20mouse/wifi-mouse-server-rce.py - Exploit, Third Party Advisory | |
References | () https://github.com/rapid7/metasploit-framework/pull/16985 - Patch, Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/49601 - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.exploit-db.com/exploits/50972 - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2022-09-19 17:15
Updated : 2024-11-21 07:19
NVD link : CVE-2022-3218
Mitre link : CVE-2022-3218
CVE.ORG link : CVE-2022-3218
JSON object : View
Products Affected
necta
- wifi_mouse_server