CVE-2026-30783

A vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android, WebClient (Client signaling, API sync loop, config management modules) allows Privilege Abuse. This vulnerability is associated with program files src/rendezvous_mediator.Rs, src/hbbs_http/sync.Rs and program routines API sync loop, api-server config handling. This issue affects RustDesk Client: through 1.4.5.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:rustdesk:rustdesk:*:*:*:*:webclient:*:*:*
OR cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-05 16:16

Updated : 2026-03-25 16:30


NVD link : CVE-2026-30783

Mitre link : CVE-2026-30783

CVE.ORG link : CVE-2026-30783


JSON object : View

Products Affected

apple

  • macos
  • iphone_os

microsoft

  • windows

rustdesk

  • rustdesk

google

  • android

linux

  • linux_kernel
CWE
CWE-602

Client-Side Enforcement of Server-Side Security

CWE-841

Improper Enforcement of Behavioral Workflow