CVE-2022-4978
Steppschuh Remote Control Server 3.1.1.12 Unauthenticated RCE
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Remote Control Server, maintained by Steppschuh, 3.1.1.12 allows unauthenticated remote code execution when authentication is disabled, which is the default configuration. The server exposes a custom UDP-based control protocol that accepts remote keyboard input events without verification. An attacker on the same network can issue a sequence of keystroke commands to launch a system shell and execute arbitrary commands, resulting in full system compromise.
Remote Control Server, maintained by Steppschuh, 3.1.1.12 allows unauthenticated remote code execution when authentication is disabled, which is the default configuration. The server exposes a custom UDP-based control protocol that accepts remote keyboard input events without verification. An attacker on the same network can issue a sequence of keystroke commands to launch a system shell and execute arbitrary commands, resulting in full system compromise.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2025-07-22 CVE Reserved
- 2025-07-23 CVE Published
- 2025-07-23 CVE Updated
- 2025-07-23 First Exploit
- 2025-07-24 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
- CWE-306: Missing Authentication for Critical Function
CAPEC
- CAPEC-88: OS Command Injection
- CAPEC-137: Parameter Injection
References (3)
URL | Tag | Source |
---|---|---|
https://remote-control-collection.com | Product | |
https://www.vulncheck.com/advisories/steppschuh-remote-control-server-unauth-rce | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/misc/remote_control_collection_rce.rb | 2025-07-23 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Steppschuh Search vendor "Steppschuh" | Remote Control Collection Server Search vendor "Steppschuh" for product "Remote Control Collection Server" | 3.1.1.12 Search vendor "Steppschuh" for product "Remote Control Collection Server" and version "3.1.1.12" | en |
Affected
|