AirKeyboard App Vulnerability: Hackers’ Dream or Users’ Nightmare?
Beware the AirKeyboard iOS app version 1.0.5. It opens a WebSocket server on port 8888 allowing remote input injection—no passwords, no pairing, just pure chaos. Attackers can type directly into your iOS device, so unless you want your iPhone sending peculiar emails, maybe avoid public Wi-Fi!

Hot Take:
Oh, AirKeyboard, you had one job: to be the invisible typewriter of the future. But instead, you’ve decided to become the cyber equivalent of a sticky note on a public fridge. Welcome to Remote Input Injection, where anyone can crash your device’s private typing party. Who knew a keyboard app could be so… open-minded?
Key Points:
- The AirKeyboard app for iOS exposes a WebSocket server on port 8888.
- It lacks authentication, allowing attackers to inject keystrokes remotely.
- Attackers can gain full control over input on a victim’s device.
- The exploit impacts version 1.0.5 of the app, tested on iOS 18.5.
- No user interaction is required for the exploit to succeed.
Already a member? Log in here