Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2016-10138

EPSS 0.05% · P17
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2016-10138

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
An issue was discovered on BLU Advance 5.0 and BLU R1 HD devices with Shanghai Adups software. The com.adups.fota.sysoper app is installed as a system app and cannot be disabled by the user. In the com.adups.fota.sysoper app's AndroidManifest.xml file, it sets the android:sharedUserId attribute to a value of android.uid.system which makes it execute as the system user, which is a very privileged user on the device. The app has an exported broadcast receiver named com.adups.fota.sysoper.WriteCommandReceiver which any app on the device can interact with. Therefore, any app can send a command embedded in an intent which will be executed by the WriteCommandReceiver component which is executing as the system user. The third-party app, utilizing the WriteCommandReceiver, can perform the following actions: call a phone number, factory reset the device, take pictures of the screen, record the screen in a video, install applications, inject events, obtain the Android log, and others. In addition, the com.adups.fota.sysoper.TaskService component will make a request to a URL of http://rebootv5.adsunflower.com/ps/fetch.do where the commands in the String array with a key of sf in the JSON Object sent back by the server will be executed as the system user. Since the connection is made via HTTP, it is vulnerable to a MITM attack.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
BLU Advance和BLU R1 HD 加密问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
BLU Advance和BLU R1 HD都是美国BLU公司的智能手机产品。 BLU Advance 5.0版本和BLU R1 HD设备中存在安全漏洞。攻击者可利用该漏洞实施MITM攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2016-10138

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2016-10138

登录查看更多情报信息。

Same Patch Batch · n/a · 2017-01-13 · 39 CVEs total

CVE-2016-9312NTP 安全漏洞
CVE-2016-7431NTP 安全漏洞
CVE-2016-7433NTP 安全漏洞
CVE-2016-7434NTP 安全漏洞
CVE-2016-8671INSIDE Secure MatrixSSL 安全漏洞
CVE-2016-8882JasPer 安全漏洞
CVE-2016-8883JasPer 安全漏洞
CVE-2016-9107Gajim OTR插件安全漏洞
CVE-2016-9310NTP ntpd 安全漏洞
CVE-2016-9311NTP nptd 拒绝服务漏洞
CVE-2016-7429NTP 安全漏洞
CVE-2016-9807GStreamer 安全漏洞
CVE-2016-9808GStreamer 安全漏洞
CVE-2016-9809GStreamer 安全漏洞
CVE-2016-9810Gstreamer gst-plugins-good 安全漏洞
CVE-2016-9811Gstreamer 安全漏洞
CVE-2016-9812GStreamer mpegts解码器安全漏洞
CVE-2016-9813GStreamer mpegts解析器安全漏洞
CVE-2010-5327Liferay Portal 安全漏洞
CVE-2017-5364福昕PDF Toolkit 安全漏洞

Showing top 20 of 39 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2016-10138

No comments yet


Leave a comment