Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2021-47851 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Remote Code Execution (RCE) via OS Command Injection. πŸ’₯ **Consequences**: Attackers can execute arbitrary commands on the target device, leading to full system compromise.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-78** (OS Command Injection). The flaw lies in an **unauthenticated HTTP endpoint** that fails to sanitize inputs, allowing shell commands to be injected.

Q3Who is affected? (Versions/Components)

πŸ“± **Affected**: **Yodinfo Mini Mouse**. Specifically **Version 9.2.0**. It is a mobile remote control app by Yodinfo. πŸ“‰ **Scope**: iOS users via Apple Store.

Q4What can hackers do? (Privileges/Data)

πŸ‘‘ **Privileges**: **High**. CVSS Score indicates **Complete** impact on Confidentiality, Integrity, and Availability. Hackers gain **full control** over the device's OS.

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Threshold**: **Very Low**. **No Authentication** required. **No User Interaction** needed. Network Accessible (AV:N). Easy to exploit remotely.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ’£ **Public Exploit**: **YES**. ExploitDB ID **49743** is available. Wild exploitation is possible given the low barrier to entry.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for **Yodinfo Mini Mouse** services. Look for the specific **HTTP endpoint** vulnerable to command injection. Check if the app version is **9.2.0**.

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Fix**: Update to the latest version from the **Apple Store**. The vendor (Yodinfo) is responsible for the patch. Check for official advisories.

Q9What if no patch? (Workaround)

🚧 **Workaround**: **Disable** the app if not in use. **Block** network access to the app's remote control endpoints via firewall. **Uninstall** if unnecessary.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. CVSS Vector shows **High** severity (9.8+ implied by H/I/H). No auth needed. Immediate patching or mitigation required.