Due to a reliance on client-side authentication, the WiFi Mouse (Mouse Server) from Necta LLC's authentication mechanism is trivially bypassed, which can result in remote code execution.
A client/server product performs authentication within client code but not in server code, allowing server-side authentication to be bypassed via a modified client that omits the authentication check.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
https://github.com/rapid7/metasploit-framework/pull/16985 | third party advisory patch |
https://www.exploit-db.com/exploits/50972 | exploit vdb entry third party advisory |
https://www.exploit-db.com/exploits/49601 | exploit vdb entry third party advisory |
https://github.com/H4rk3nz0/PenTesting/blob/main/Exploits/wifi%20mouse/wifi-mouse-server-rce.py | third party advisory exploit |
http://packetstormsecurity.com/files/168509/WiFi-Mouse-1.8.3.4-Remote-Code-Execution.html | exploit vdb entry third party advisory |