CVE-2022-4978
CRITICALRemote Control Server 3.1.1.12 - RCE
Title source: llmDescription
Remote Control Server, maintained by Steppschuh, 3.1.1.12 allows unauthenticated remote code execution when authentication is disabled, which is the default configuration. The server exposes a custom UDP-based control protocol that accepts remote keyboard input events without verification. An attacker on the same network can issue a sequence of keystroke commands to launch a system shell and execute arbitrary commands, resulting in full system compromise.
Exploits (1)
metasploit
WORKING POC
NORMAL
by h00die, H4rk3nz0 · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/misc/remote_control_collection_rce.rb
References (3)
Scores
CVSS v4
9.3
EPSS
0.3243
EPSS Percentile
96.9%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
total
Details
CWE
CWE-306
CWE-78
Status
published
Products (1)
Steppschuh/Remote Control Collection Server
3.1.1.12
Published
Jul 23, 2025
Tracked Since
Feb 18, 2026