WebJun 4, 2024 · Inateck WP2002 is a ring-shaped wearable wireless presenter using 2.4 GHz radio communication. The manufacturer describes the product as follows: " * Easy to Use: Uses 2.4 GHz USB wireless connection, with receiving distance reaching 20 meters. You’re free to move in a large space when wearing it on fingers. No driver needed, just plug and … WebDec 2, 2014 · The Inateck FD2002 also offers integrated safeguards, Hot-Swap and Plug and Play functionality, and a tool-free design. Integrated safeguards preventing overvoltage, leak currents, short circuits and peak voltage, interference and disturbance, guaranteed safer data transfer and access.
CVE-2024-12504 : Due to unencrypted and unauthenticated data ...
Web1 Inateck: 2 Wp2002, Wp2002 Firmware: 2024-07-21: 8.3 HIGH: 8.8 HIGH: Due to unencrypted and unauthenticated data communication, the wireless presenter Inateck WP2002 is prone to keystroke injection attacks. Thus, an attacker is able to send arbitrary keystrokes to a victim's computer system, e.g., to install malware when the target system … WebD ue to unencrypted and unauthenticated data communication, the wireless presenter Inateck WP2002 is prone to keystroke injection attacks. Thus, an attacker is able to send arbitrary keystrokes to a victim's computer system, e.g., to install malware when the target system is unattended. In this way, an attacker can remotely take control over ... irctc historical share price
Products – Inateck Official
WebJul 10, 2024 · 「Inateck WP2002 BLACK」 という フィンガー・プレゼンター です。 リングのようなマウスで、2.4 GHzUSBワイヤレス経由にて接続して、受信距離は20メートル … WebThis page lists vulnerability statistics for all versions of Inateck Wp2002. Vulnerability statistics provide a quick overview for security vulnerabilities of this software. You can … WebDue to unencrypted and unauthenticated data communication, the wireless presenter Inateck WP2002 is prone to keystroke injection attacks. Thus, an attacker is able to send arbitrary keystrokes to a victim's computer system, e.g., to install malware when the target system is unattended. In this way, an attacker can remotely take control over the victim's … irctc hotel at katra station