Skip to content
Threat Feed
critical advisory

UXGROUP Cast to TV Screen Mirroring Arbitrary File Overwrite Vulnerability (CVE-2026-30282)

UXGROUP LLC Cast to TV Screen Mirroring v2.2.77 is vulnerable to arbitrary file overwrite (CVE-2026-30282) via the file import process, allowing attackers to overwrite critical internal files and potentially achieve arbitrary code execution or information exposure.

CVE-2026-30282 describes an arbitrary file overwrite vulnerability affecting UXGROUP LLC’s Cast to TV Screen Mirroring version 2.2.77. This vulnerability exists within the application’s file import functionality. An attacker with the ability to supply a malicious file through the import process can overwrite critical internal application files. Successful exploitation can lead to arbitrary code execution within the context of the application or the exposure of sensitive information stored within the overwritten files. This vulnerability was published on March 31, 2026, and presents a significant risk to users of the affected software, as it could allow for complete compromise of the application and potentially the underlying system.

Attack Chain

  1. An attacker identifies an instance of UXGROUP LLC Cast to TV Screen Mirroring v2.2.77.
  2. The attacker gains access to the file import functionality, which could be exposed through a user interface element or API endpoint.
  3. The attacker crafts a malicious file designed to overwrite a critical internal application file. This could involve manipulating file paths or filenames to achieve the desired overwrite location.
  4. The attacker imports the malicious file into the Cast to TV Screen Mirroring application using the intended file import mechanism.
  5. The application processes the imported file, and due to the vulnerability, overwrites the targeted critical internal file.
  6. If the overwritten file contains executable code, the attacker may be able to achieve arbitrary code execution within the context of the application.
  7. Alternatively, if the overwritten file contains sensitive configuration data or credentials, the attacker may be able to steal this information.
  8. The attacker leverages the code execution or stolen information to further compromise the system or network.

Impact

Successful exploitation of CVE-2026-30282 allows an attacker to overwrite critical internal files within UXGROUP LLC Cast to TV Screen Mirroring v2.2.77. This can lead to arbitrary code execution, allowing the attacker to execute malicious commands on the system running the application. Alternatively, the attacker could overwrite files containing sensitive information, such as configuration data or credentials, leading to information exposure and potential further compromise. The CVSS v3.1 score of 9.0 indicates a critical severity, emphasizing the potential for significant damage.

Recommendation

  • Monitor network traffic and system logs for attempts to exploit CVE-2026-30282 by detecting abnormal file import patterns, implement the Sigma rule Detect Suspicious File Import Overwrite to identify potential exploit attempts based on file events.
  • Since no patch is mentioned, consider alternative screen mirroring solutions or isolating the affected application to minimize potential damage.
  • Investigate and remediate any systems where UXGROUP LLC Cast to TV Screen Mirroring v2.2.77 is installed and showing signs of compromise.

Detection coverage 2

Detect Suspicious File Import Overwrite

high

Detects potential arbitrary file overwrite attempts during file import operations by monitoring for unusual file creation or modification events in sensitive directories.

sigma tactics: persistence, privilege_escalation techniques: T1547.001 sources: file_event, windows

Detect Suspicious File Import Process

medium

Detects potential arbitrary file overwrite attempts based on unusual process execution related to the Cast to TV application's file import process.

sigma tactics: execution, initial_access sources: process_creation, windows

Detection queries are kept inside the platform. Get full rules →

Indicators of compromise

1

email

TypeValue
email[email protected]