Different keystroke injection vulnerabilities
In MouseJack attacks, you send unencrypted data packets to the USB dongle (receiver) even if the targeted wireless keyboard itself only sends encrypted data packets, and you get keystroke injection because the USB dongle accepts and interprets the unencrypted data packets as well (MouseJack keyboard spoofing vulnerability) and sends corresponding USB HID data (keystrokes) to the connected computer system.
The keystroke injection vulnerability shown here is not based on accepting unencrypted data packets but on cryptographic issues concerning AES counter mode used in different wireless desktop sets, like the targeted ones from Cherry, Logitech, and Perixx.