A vulnerability classified as critical has been found in IROAD X5 Mobile App up to 5.2.5 on Android. Affected is an unknown function of the component API Endpoint. The manipulation leads to hard-coded credentials. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
The product contains a hard-coded password, which it uses for its own inbound authentication or for outbound communication to external components.
Link | Tags |
---|---|
https://vuldb.com/?id.299808 | vdb entry |
https://vuldb.com/?ctiid.299808 | signature permissions required |
https://vuldb.com/?submit.512419 | third party advisory |
https://github.com/geo-chen/IROAD?tab=readme-ov-file#finding-2-hardcoded-credentials-in-apk-iroad--v525-to-ports-9091-and-9092 | exploit |