AnyDesk version 5.5.2 suffers from a remote code execution vulnerability.
8e5933970e73ac51ffd6b11ddf9104d956d40fbf5a5bceb99ab35bbc5d7d36d2
The AnyDesk GUI is vulnerable to a remotely exploitable format string vulnerability. By sending a specially crafted discovery packet, an attacker can corrupt the frontend process when it loads or refreshes. While the discovery service is always running, the GUI frontend must be started to trigger the vulnerability. On successful exploitation, code is executed within the context of the user who started the AnyDesk GUI.
3a9a77f3da97e3fa3eabb2ff840fb3ea885747038fdb66fcbcb8f64ab38332f4