Unrated severityNVD Advisory· Published Mar 5, 2026· Updated Mar 6, 2026
RustDesk Client Blindly Merges Unauthenticated Strategy Payloads, Bypassing Local Security Settings
CVE-2026-30792
Description
A vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android, WebClient (Strategy sync, HTTP API client, config options engine modules) allows Application API Message Manipulation via Man-in-the-Middle. This vulnerability is associated with program files src/hbbs_http/sync.Rs, hbb_common/src/config.Rs and program routines Strategy merge loop in sync.Rs, Config::set_options().
This issue affects RustDesk Client: through 1.4.5.
Affected products
1- Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- docs.google.com/document/d/e/2PACX-1vSds6jjpd38oO_yIAyd1HYtKNUuea-I-ozAPpGhYI7QgAU-QGJ7D8a4rOZVj1vmiUXV1EcdRHf9aZAW/pubmitrethird-party-advisoryexploit
- www.vulsec.orgmitrevdb-entrythird-party-advisory
- rustdesk.com/docs/en/self-host/client-configuration/advanced-settings/mitretechnical-descriptionx_--config documentation
News mentions
0No linked articles in our index yet.