Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2019-6447 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: ES File Explorer fails to close TCP port 59777 after initial use. πŸ“‰ **Consequences**: The port remains open, allowing attackers to send HTTP JSON requests to read arbitrary files on the device.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **CWE**: CWE-269 (Improper Privilege Management) / Access Control Error. πŸ” **Flaw**: The application initializes an HTTP server on port 59777 but does not properly shut it down or restrict access after the first run.…

Q3Who is affected? (Versions/Components)

πŸ“± **Product**: ES File Explorer File Manager (Android). πŸ“¦ **Affected Versions**: Version 4.1.9.7.4 and all earlier versions. ⚠️ **Note**: With 500M+ users, the potential attack surface is massive.

Q4What can hackers do? (Privileges/Data)

πŸ’» **Privileges**: No authentication required. πŸ“‚ **Data Access**: Attackers can perform **Arbitrary File Read**.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Threshold**: LOW. 🚫 **Auth**: None needed. βš™οΈ **Config**: The app just needs to have been launched at least once. If the port is open, any local or networked attacker can send a crafted HTTP request to exploit it.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”₯ **Exploit**: YES. πŸ“‚ **Public PoC**: Multiple GitHub repositories exist (e.g., fs0c131y/ESFileExplorerOpenPortVuln). πŸ› οΈ **Tools**: Simple bash scripts using `curl` are available to demonstrate arbitrary file reading.…

Q7How to self-check? (Features/Scanning)

πŸ” **Check**: Scan for open TCP port **59777** on the target Android device. πŸ“‘ **Test**: Send an HTTP GET request to `http://<IP>:59777/`. If the server responds, the vulnerability is present.…

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Fix**: Update ES File Explorer to a version newer than 4.1.9.7.4. 🚫 **Mitigation**: Uninstall the app if not needed. The vendor should have patched the lifecycle management of the HTTP server to ensure port closure.

Q9What if no patch? (Workaround)

πŸ›‘ **Workaround**: If you cannot update, **uninstall** the application immediately.…

Q10Is it urgent? (Priority Suggestion)

🚨 **Priority**: HIGH. ⚑ **Urgency**: Critical due to the sheer number of affected users (500M+) and the ease of exploitation (no auth). πŸ“’ **Action**: Patch or remove immediately to prevent data leakage.