



The actual device is only of interest for the questions: This is because theĪttacker is communicating with the receiver via RF while impersonating a real device. In fact, in order toĬarry out a keystroke injection attack, the actual input device does not even have to be in range. The vulnerable part is the wireless receiver. Keystroke injection attacks, this is not the case. In context of attacks on Logitech devices, the device itself is often assumed to be vulnerable. This document focuses on Logitech devices only, as other vendors haven't been part of my own research. So here is an attempt to clarify some things. Lately, I reported some new vulnerabilities for Logitech devices, myself, and noticed that one could easily get There has been a ton of research on wireless input devices using proprietary 2.4 GHz radio technology. The repo holding all the disclosure material for the research is published here: Summary / Overview of known Logitech wireless peripheral vulnerabilities
