UXGROUP Cast to TV Screen Mirroring Arbitrary File Overwrite Vulnerability (CVE-2026-30282)
UXGROUP LLC Cast to TV Screen Mirroring v2.2.77 is vulnerable to arbitrary file overwrite (CVE-2026-30282) via the file import process, allowing attackers to overwrite critical internal files and potentially achieve arbitrary code execution or information exposure.
CVE-2026-30282 describes an arbitrary file overwrite vulnerability affecting UXGROUP LLC’s Cast to TV Screen Mirroring version 2.2.77. This vulnerability exists within the application’s file import functionality. An attacker with the ability to supply a malicious file through the import process can overwrite critical internal application files. Successful exploitation can lead to arbitrary code execution within the context of the application or the exposure of sensitive information stored within the overwritten files. This vulnerability was published on March 31, 2026, and presents a significant risk to users of the affected software, as it could allow for complete compromise of the application and potentially the underlying system.
Attack Chain
- An attacker identifies an instance of UXGROUP LLC Cast to TV Screen Mirroring v2.2.77.
- The attacker gains access to the file import functionality, which could be exposed through a user interface element or API endpoint.
- The attacker crafts a malicious file designed to overwrite a critical internal application file. This could involve manipulating file paths or filenames to achieve the desired overwrite location.
- The attacker imports the malicious file into the Cast to TV Screen Mirroring application using the intended file import mechanism.
- The application processes the imported file, and due to the vulnerability, overwrites the targeted critical internal file.
- If the overwritten file contains executable code, the attacker may be able to achieve arbitrary code execution within the context of the application.
- Alternatively, if the overwritten file contains sensitive configuration data or credentials, the attacker may be able to steal this information.
- The attacker leverages the code execution or stolen information to further compromise the system or network.
Impact
Successful exploitation of CVE-2026-30282 allows an attacker to overwrite critical internal files within UXGROUP LLC Cast to TV Screen Mirroring v2.2.77. This can lead to arbitrary code execution, allowing the attacker to execute malicious commands on the system running the application. Alternatively, the attacker could overwrite files containing sensitive information, such as configuration data or credentials, leading to information exposure and potential further compromise. The CVSS v3.1 score of 9.0 indicates a critical severity, emphasizing the potential for significant damage.
Recommendation
- Monitor network traffic and system logs for attempts to exploit CVE-2026-30282 by detecting abnormal file import patterns, implement the Sigma rule
Detect Suspicious File Import Overwriteto identify potential exploit attempts based on file events. - Since no patch is mentioned, consider alternative screen mirroring solutions or isolating the affected application to minimize potential damage.
- Investigate and remediate any systems where UXGROUP LLC Cast to TV Screen Mirroring v2.2.77 is installed and showing signs of compromise.
Detection coverage 2
Detect Suspicious File Import Overwrite
highDetects potential arbitrary file overwrite attempts during file import operations by monitoring for unusual file creation or modification events in sensitive directories.
Detect Suspicious File Import Process
mediumDetects potential arbitrary file overwrite attempts based on unusual process execution related to the Cast to TV application's file import process.
Detection queries are kept inside the platform. Get full rules →
Indicators of compromise
1
| Type | Value |
|---|---|
| [email protected] |