CVE-2022-3218
Necta WiFi Mouse (Mouse Server) client-side authentication bypass
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
Due to a reliance on client-side authentication, the WiFi Mouse (Mouse Server) from Necta LLC's authentication mechanism is trivially bypassed, which can result in remote code execution.
| CWE | CWE-603 |
| Vendor | necta llc |
| Product | wifi mouse (mouse server) |
| Published | Sep 19, 2022 |
| Last Updated | Sep 16, 2024 |
Stay Ahead of the Next One
Get instant alerts for necta llc wifi mouse (mouse server)
Be the first to know when new unknown vulnerabilities affecting necta llc wifi mouse (mouse server) are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Necta LLC / WiFi Mouse (Mouse Server)
1.8.3.4 โค 1.8.3.4 1.8.2.3 โค 1.8.2.3
References
github.com: https://github.com/rapid7/metasploit-framework/pull/16985 exploit-db.com: https://www.exploit-db.com/exploits/50972 exploit-db.com: https://www.exploit-db.com/exploits/49601 github.com: https://github.com/H4rk3nz0/PenTesting/blob/main/Exploits/wifi%20mouse/wifi-mouse-server-rce.py packetstormsecurity.com: http://packetstormsecurity.com/files/168509/WiFi-Mouse-1.8.3.4-Remote-Code-Execution.html
Credits
H4rk3nz0, REDHATAUGUST, and h00die discovered and reported this vulnerability.