You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Is there a different instruction set for U0008 and U0012? I only have 1 0007 and I cant seem to get 0008 to work. The script get transmitted but nothing executes on my victim end. The receiver is out of box version.
Is there a way to flash the vulnerable firmware into the receiver?
The text was updated successfully, but these errors were encountered:
It doesn't depend on the Unifying receiver, but on the firmware version, which kinds of vulnerability exists.
Rule of thumb:
Only the oldest Unifying receiver firmwares accept plain injection (MouseJack). But, also the newest firmware accept injection, if the encryption key is known, because
a) pairing of a keyboard was sniffed with LOGITacker (CVE-2019-13052)
b) the key was dumped with munifying (receiver is vulnerable to CVE-2019-13055) and manually added to LOGITacker.
For details on patched vulnerabilities across different firmware versions, see the respective READMEs in Logitech's repo (CU0007 is RQR12, CU0008/0016 is RQR24):
Is there a different instruction set for U0008 and U0012? I only have 1 0007 and I cant seem to get 0008 to work. The script get transmitted but nothing executes on my victim end. The receiver is out of box version.
Is there a way to flash the vulnerable firmware into the receiver?
The text was updated successfully, but these errors were encountered: