CVE-2026-30783

Published: Mar 05, 2026 Last Modified: Mar 05, 2026
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 8,8
Source: 2fdefc65-d750-4b8d-96ee-6e2c0c42dbfe
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Confidentiality: N/A
Integrity: N/A
Availability: N/A

Description

AI Translation Available

A vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android, WebClient (Client signaling, API sync loop, config management modules) allows Privilege Abuse. This vulnerability is associated with program files src/rendezvous_mediator.Rs, src/hbbs_http/sync.Rs and program routines API sync loop, api-server config handling.

This issue affects RustDesk Client: through 1.4.5.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0007
Percentile
0,2th
Updated

EPSS Score Trend (Last 10 Days)

602

Client-Side Enforcement of Server-Side Security

Draft
Common Consequences
Security Scopes Affected:
Access Control Availability
Potential Impacts:
Bypass Protection Mechanism Dos: Crash, Exit, Or Restart Gain Privileges Or Assume Identity
Applicable Platforms
Technologies: ICS/OT, Mobile
View CWE Details
841

Improper Enforcement of Behavioral Workflow

Incomplete
Common Consequences
Security Scopes Affected:
Other
Potential Impacts:
Alter Execution Logic
Applicable Platforms
All platforms may be affected
View CWE Details
https://docs.google.com/document/d/e/2PACX-1vSds6jjpd38oO_yIAyd1HYtKNUuea-I-ozA…
https://rustdesk.com/docs/en/client/
https://www.vulsec.org/