Unauthenticated Remote Code Execution in Steppschuh Remote Control Server
CVE-2022-4978
Key Information:
- Vendor
Steppschuh
- Vendor
- CVE Published:
- 23 July 2025
Badges
What is CVE-2022-4978?
The Steppschuh Remote Control Server version 3.1.1.12 is vulnerable to unauthenticated remote code execution due to a lack of verification for incoming commands. When authentication is disabled, which is its default setting, the server accepts keyboard input events over a custom UDP-based control protocol. This flaw enables attackers on the same network to send arbitrary keystroke commands, potentially allowing them to gain a system shell and execute malicious commands, resulting in a complete compromise of the affected system.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Remote Control Collection Server 3.1.1.12
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
32% chance of being exploited in the next 30 days.
CVSS V4
Timeline
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
