Due to reliance on a trivial substitution cipher, sent in cleartext, and the reliance on a default password when the user does not set a password, the Remote Mouse Server by Emote Interactive can be abused by attackers to inject OS commands over theproduct's custom control protocol. A Metasploit module was written and tested against version 4.110, the current version when this CVE was reserved.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://github.com/rapid7/metasploit-framework/pull/17067 |
![]() ![]() |
History
Tue, 28 Jan 2025 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Tue, 28 Jan 2025 00:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Due to reliance on a trivial substitution cipher, sent in cleartext, and the reliance on a default password when the user does not set a password, the Remote Mouse Server by Emote Interactive can be abused by attackers to inject OS commands over theproduct's custom control protocol. A Metasploit module was written and tested against version 4.110, the current version when this CVE was reserved. | |
Title | Emote Interactive Remote Mouse Server command injection due to weak encoding | |
Weaknesses | CWE-327 | |
References |
|

Status: PUBLISHED
Assigner: rapid7
Published:
Updated: 2025-01-28T15:18:05.386Z
Reserved: 2022-09-29T20:32:43.236Z
Link: CVE-2022-3365

No data.

Status : Awaiting Analysis
Published: 2025-01-28T01:15:08.277
Modified: 2025-01-28T16:15:34.643
Link: CVE-2022-3365

No data.