CVE-2026-30798 PUBLISHED

RustDesk Client Accepts Unauthenticated stop-service Command via Strategy Payload

Assigner: VULSec
Reserved: 05.03.2026 Published: 05.03.2026 Updated: 05.03.2026

Insufficient Verification of Data Authenticity, Improper Handling of Exceptional Conditions vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android (Heartbeat sync loop, strategy processing modules) allows Protocol Manipulation. This vulnerability is associated with program files src/hbbs_http/sync.Rs and program routines stop-service handler in heartbeat loop.

This issue affects RustDesk Client: through 1.4.5.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
CVSS Score: 8.2

Product Status

Vendor rustdesk-client
Product RustDesk Client
Versions Default: affected
  • affected from 0 to 1.4.5 (incl.)

Affected Configurations

Client connected to API server (or re-homed via rustdesk://config)

Exploits

PoC available.

Workarounds

None effective

Solutions

Remove remote kill logic, or require time-limited signed payloads

Credits

  • Erez Kalman finder
  • Erez Kalman reporter

References

Problem Types

  • CWE-345 Insufficient Verification of Data Authenticity CWE
  • CWE-755 Improper Handling of Exceptional Conditions CWE

Impacts

  • CAPEC-272 Protocol Manipulation