Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-15349

EPSS 0.14% · P33
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2019-15349

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The Tecno Camon Android device with a build fingerprint of TECNO/H612/TECNO-ID5a:8.1.0/O11019/F-180828V106:user/release-keys contains a pre-installed platform app with a package name of com.lovelyfont.defcontainer (versionCode=7, versionName=7.0.11). This app contains an exported service named com.lovelyfont.manager.service.FunctionService that allows any app co-located on the device to supply the file path to a Dalvik Executable (DEX) file which it will dynamically load within its own process and execute in with its own system privileges. This app cannot be disabled by the user and the attack can be performed by a zero-permission app. Executing commands as the system user can allow a third-party app to video record the user's screen, factory reset the device, obtain the user's notifications, read the logcat logs, inject events in the Graphical User Interface (GUI), and obtains the user's text messages, and more. Executing code as the system user can allow a third-party app to factory reset the device, obtain the user's Wi-Fi passwords, obtain the user's notifications, read the logcat logs, inject events in the GUI, change the default Input Method Editor (IME) (e.g., keyboard) with one contained within the attacking app that contains keylogging functionality, and obtains the user's text messages, and more.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
传音 Tecno Camon 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
传音 Tecno Camon是中国传音公司的一款Camon系列智能手机。 传音 Tecno Camon(build fingerprint:TECNO/H612/TECNO-ID5a:8.1.0/O11019/F-180828V106:user/release-keys)中的com.lovelyfont.defcontainer存在安全漏洞。攻击者可利用该漏洞以系统权限执行代码或命令,进而进行录屏,恢复出厂设置,获取用户Wi-Fi密码,读取logcat日志,向GUI注入事件或修改默认的Input Meth
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2019-15349

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2019-15349

登录查看更多情报信息。

Same Patch Batch · n/a · 2019-11-14 · 226 CVEs total

CVE-2019-15390Haier G8 访问控制错误漏洞
CVE-2019-15404ASUS ZenFone Max 4 访问控制错误漏洞
CVE-2019-15403ASUS ZenFone 3s Max 访问控制错误漏洞
CVE-2019-15402ASUS ASUS_A002_2 访问控制错误漏洞
CVE-2019-15401ASUS ASUS_A002 访问控制错误漏洞
CVE-2019-15400ASUS ZenFone 3 Ultra 访问控制错误漏洞
CVE-2019-15399ASUS ZenFone 5Q 访问控制错误漏洞
CVE-2019-15398ASUS ZenFone 4 Selfie 访问控制错误漏洞
CVE-2019-15397ASUS ZenFone Max 4 访问控制错误漏洞
CVE-2019-15396ASUS ZenFone 3 访问控制错误漏洞
CVE-2019-15395ASUS ZenFone 3s Max 访问控制错误漏洞
CVE-2019-15394ASUS ZenFone 5 Selfie 访问控制错误漏洞
CVE-2019-15393ASUS ZenFone Live 访问控制错误漏洞
CVE-2019-15392ASUS ZenFone 4 Selfie 访问控制错误漏洞
CVE-2019-15391ASUS ZenFone 4 Selfie 访问控制错误漏洞
CVE-2019-15379Walton Primo G3 访问控制错误漏洞
CVE-2019-15382华富瑞科技 Cubot Nova 访问控制错误漏洞
CVE-2019-15381BQ 5515L 访问控制错误漏洞
CVE-2019-15380ASN IP Fly Photo Pro 安全漏洞
CVE-2019-15383Allview X5 安全漏洞

Showing top 20 of 226 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2019-15349

No comments yet


Leave a comment