CVE-2022-4978

CRITICAL

Remote Control Server 3.1.1.12 - RCE

Title source: llm

Description

Remote Control Server, maintained by Steppschuh, 3.1.1.12 allows unauthenticated remote code execution when authentication is disabled, which is the default configuration. The server exposes a custom UDP-based control protocol that accepts remote keyboard input events without verification. An attacker on the same network can issue a sequence of keystroke commands to launch a system shell and execute arbitrary commands, resulting in full system compromise.

Exploits (1)

metasploit WORKING POC NORMAL
by h00die, H4rk3nz0 · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/misc/remote_control_collection_rce.rb

Scores

CVSS v4 9.3
EPSS 0.3243
EPSS Percentile 96.9%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact total

Details

CWE
CWE-306 CWE-78
Status published
Products (1)
Steppschuh/Remote Control Collection Server 3.1.1.12
Published Jul 23, 2025
Tracked Since Feb 18, 2026