Authentication Bypass by Capture-replay, Use of Password Hash With Insufficient Computational Effort vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android (Client login, peer authentication modules) allows Reusing Session IDs (aka Session Replay). This vulnerability is associated with program files src/client.Rs and program routines hash_password(), login proof construction. This issue affects RustDesk Client: through 1.4.5.
Use CWE-294, Rustdesk vendor hub and Rustdesk product page to widen CVE-2026-30789 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2024-25140, CVE-2026-30797 and CVE-2026-30793 for nearby disclosures in the same product family.