CVE-2026-30792
RustDesk Client Blindly Merges Unauthenticated Strategy Payloads, Bypassing Local Security Settings
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
A vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android, WebClient (Strategy sync, HTTP API client, config options engine modules) allows Application API Message Manipulation via Man-in-the-Middle. This vulnerability is associated with program files src/hbbs_http/sync.Rs, hbb_common/src/config.Rs and program routines Strategy merge loop in sync.Rs, Config::set_options(). This issue affects RustDesk Client: through 1.4.5.
| CWE | CWE-657 |
| Vendor | rustdesk-client |
| Product | rustdesk client |
| Published | Mar 5, 2026 |
| Last Updated | Mar 6, 2026 |
Stay Ahead of the Next One
Get instant alerts for rustdesk-client rustdesk client
Be the first to know when new unknown vulnerabilities affecting rustdesk-client rustdesk client are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
rustdesk-client / RustDesk Client
0 โค 1.4.5
References
Credits
Erez Kalman ๐ Erez Kalman