Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fj4x-vq3p-rjcf

Опубликовано: 10 дек. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 4.6

Описание

The mobile application insecurely handles information stored within memory. By performing a memory dump on the application after a user has logged out and terminated it, Wi-Fi credentials sent during the pairing process, JWTs used for authentication, and other sensitive details can be retrieved. As a result, an attacker with physical access to the device of a victim can retrieve this information and gain unauthorized access to their home Wi-Fi network and Meatmeet account.

The mobile application insecurely handles information stored within memory. By performing a memory dump on the application after a user has logged out and terminated it, Wi-Fi credentials sent during the pairing process, JWTs used for authentication, and other sensitive details can be retrieved. As a result, an attacker with physical access to the device of a victim can retrieve this information and gain unauthorized access to their home Wi-Fi network and Meatmeet account.

EPSS

Процентиль: 4%
0.00018
Низкий

4.6 Medium

CVSS3

Дефекты

CWE-316

Связанные уязвимости

CVSS3: 4.6
nvd
около 2 месяцев назад

The mobile application insecurely handles information stored within memory. By performing a memory dump on the application after a user has logged out and terminated it, Wi-Fi credentials sent during the pairing process, JWTs used for authentication, and other sensitive details can be retrieved. As a result, an attacker with physical access to the device of a victim can retrieve this information and gain unauthorized access to their home Wi-Fi network and Meatmeet account.

EPSS

Процентиль: 4%
0.00018
Низкий

4.6 Medium

CVSS3

Дефекты

CWE-316