Remote Input Injection Vulnerability in Air Keyboard iOS App... #1144
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Remote Input Injection Vulnerability in Air Keyboard
1. Overview
On June 13, 2025, the CXSecurity advisory WLB-2025060015 disclosed a remote input injection vulnerability in the iOS version of Air Keyboard (App Store ID 6463187929). The app listens on TCP port
8888
without authentication or encryption, enabling any att...🔧 Technical Details
The iOS input injection exploits an unauthenticated TCP listener on port
8888
. By sending a length-prefixed frame ([2-byte length][1-byte device_id][ASCII keystrokes]) over a raw socket, an attacker can inject arbitrary keystrokes remotely, resulting in full input hijacking.The Android DoS vector abuses the AES-ECB handshake on port
55535
. Malformed payloads bypass the expected encrypted nonce, triggering an unhandled exception in the OpenSSL decryption routin...🤖 Agent Actions
Added detailed coverage of Air Keyboard’s unauthenticated TCP listener vulnerability and Android DoS flaw:
Created new page
src/mobile-pentesting/ios-pentesting/air-keyboard-remote-input-injection.md
• Explains protocol/frame format, PoC code, scanning, reverse-engineering insights, Android DoS vector, mitigations, detection cheatsheet, references.
Linked the new content from related sections
• Inserted reference in iOS pentesting README under a new “Interesting Vulnerabilities & Case Studies” section.
• Inserted reference in Android app pentesting README under “Case Studies & Vulnerabilities”.
These updates integrate the new mobile input-injection technique into existing mobile-pentesting documentation with proper cross-linking and references.
✅ Review Checklist
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.