A vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android, WebClient (Strategy sync, HTTP API client, config options engine modules) allows Application API Message Manipulation via Man-in-the-Middle. This vulnerability is associated with program files src/hbbs_http/sync.Rs, hbb_common/src/config.Rs and program routines Strategy merge loop in sync.Rs, Config::set_options().
This issue affects RustDesk Client: through 1.4.5.
Client connected to any API server (Pro). MiTM or re-homing can also trigger.
PoC available. Trivially exploitable.
None effective — allow-remote-config-modification toggle is ignored
Enforce runtime toggle checks. Implement payload signing with server private key.