CVE-2024-46963: n/a
The com.superfast.video.downloader (aka Super Unlimited Video Downloader - All in One) application through 5.1.9 for Android allows an attacker to execute arbitrary JavaScript code via the com.bluesky.browser.ui.BrowserMainActivity component.
AI Analysis
Technical Summary
CVE-2024-46963 is a vulnerability identified in the Android application 'Super Unlimited Video Downloader' (package com.superfast.video.downloader), specifically through its component com.bluesky.browser.ui.BrowserMainActivity. This flaw allows an attacker to execute arbitrary JavaScript code within the context of the app. The vulnerability is categorized under CWE-94, which involves improper control of code generation, leading to code injection risks. The attack vector is network-based (AV:N), requiring no privileges (PR:N), but user interaction is necessary (UI:R), such as clicking a malicious link or loading crafted content within the app's browser component. The vulnerability impacts confidentiality and integrity (C:H/I:H) but does not affect availability (A:N). The CVSS 3.1 base score is 8.1, indicating a high severity threat. The lack of patches or known exploits in the wild suggests the vulnerability is newly disclosed. The affected versions include all versions up to 5.1.9, with no specific version exclusions noted. The vulnerability could be exploited to inject malicious JavaScript, potentially leading to data theft, session hijacking, or unauthorized actions within the app environment. Given the app’s function as a video downloader with embedded browser capabilities, the attack surface includes any web content rendered or processed by the BrowserMainActivity component.
Potential Impact
The exploitation of CVE-2024-46963 could have significant consequences for users and organizations relying on the affected Android app. Attackers could execute arbitrary JavaScript code, leading to unauthorized access to sensitive user data such as credentials, personal information, or session tokens. This compromises confidentiality and integrity, potentially enabling further attacks like account takeover or data manipulation. Since the vulnerability does not require privileges but does require user interaction, phishing or social engineering could be used to lure victims into triggering the exploit. The app’s role as a video downloader with browser functionality increases the risk of exposure to malicious web content. Organizations with employees using this app on corporate or personal devices risk data leakage or compromise of internal resources if the app is used to access corporate networks or data. The absence of known exploits in the wild reduces immediate risk but does not eliminate it, as attackers may develop exploits rapidly following public disclosure. The vulnerability’s impact is primarily on Android platforms, affecting millions of users worldwide, especially in regions with high Android adoption and app popularity.
Mitigation Recommendations
To mitigate CVE-2024-46963, users and organizations should immediately assess the presence of the Super Unlimited Video Downloader app on Android devices and restrict its use until a vendor patch is available. Since no patches are currently published, mitigation should include uninstalling the app or disabling its browser component if possible. Users should avoid interacting with untrusted links or content within the app’s browser interface to reduce the risk of triggering the vulnerability. Network-level protections such as web filtering and blocking access to known malicious domains can help prevent exploitation. Organizations should enforce mobile device management (MDM) policies to control app installations and permissions, limiting the app’s ability to execute code or access sensitive data. Monitoring network and device logs for unusual activity related to the app can aid in early detection of exploitation attempts. Finally, maintain awareness of vendor announcements for patches or updates addressing this vulnerability and apply them promptly once available.
Affected Countries
United States, India, Brazil, Indonesia, Russia, Mexico, Germany, United Kingdom, France, South Africa, Nigeria, Philippines, Vietnam, Turkey
CVE-2024-46963: n/a
Description
The com.superfast.video.downloader (aka Super Unlimited Video Downloader - All in One) application through 5.1.9 for Android allows an attacker to execute arbitrary JavaScript code via the com.bluesky.browser.ui.BrowserMainActivity component.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-46963 is a vulnerability identified in the Android application 'Super Unlimited Video Downloader' (package com.superfast.video.downloader), specifically through its component com.bluesky.browser.ui.BrowserMainActivity. This flaw allows an attacker to execute arbitrary JavaScript code within the context of the app. The vulnerability is categorized under CWE-94, which involves improper control of code generation, leading to code injection risks. The attack vector is network-based (AV:N), requiring no privileges (PR:N), but user interaction is necessary (UI:R), such as clicking a malicious link or loading crafted content within the app's browser component. The vulnerability impacts confidentiality and integrity (C:H/I:H) but does not affect availability (A:N). The CVSS 3.1 base score is 8.1, indicating a high severity threat. The lack of patches or known exploits in the wild suggests the vulnerability is newly disclosed. The affected versions include all versions up to 5.1.9, with no specific version exclusions noted. The vulnerability could be exploited to inject malicious JavaScript, potentially leading to data theft, session hijacking, or unauthorized actions within the app environment. Given the app’s function as a video downloader with embedded browser capabilities, the attack surface includes any web content rendered or processed by the BrowserMainActivity component.
Potential Impact
The exploitation of CVE-2024-46963 could have significant consequences for users and organizations relying on the affected Android app. Attackers could execute arbitrary JavaScript code, leading to unauthorized access to sensitive user data such as credentials, personal information, or session tokens. This compromises confidentiality and integrity, potentially enabling further attacks like account takeover or data manipulation. Since the vulnerability does not require privileges but does require user interaction, phishing or social engineering could be used to lure victims into triggering the exploit. The app’s role as a video downloader with browser functionality increases the risk of exposure to malicious web content. Organizations with employees using this app on corporate or personal devices risk data leakage or compromise of internal resources if the app is used to access corporate networks or data. The absence of known exploits in the wild reduces immediate risk but does not eliminate it, as attackers may develop exploits rapidly following public disclosure. The vulnerability’s impact is primarily on Android platforms, affecting millions of users worldwide, especially in regions with high Android adoption and app popularity.
Mitigation Recommendations
To mitigate CVE-2024-46963, users and organizations should immediately assess the presence of the Super Unlimited Video Downloader app on Android devices and restrict its use until a vendor patch is available. Since no patches are currently published, mitigation should include uninstalling the app or disabling its browser component if possible. Users should avoid interacting with untrusted links or content within the app’s browser interface to reduce the risk of triggering the vulnerability. Network-level protections such as web filtering and blocking access to known malicious domains can help prevent exploitation. Organizations should enforce mobile device management (MDM) policies to control app installations and permissions, limiting the app’s ability to execute code or access sensitive data. Monitoring network and device logs for unusual activity related to the app can aid in early detection of exploitation attempts. Finally, maintain awareness of vendor announcements for patches or updates addressing this vulnerability and apply them promptly once available.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-09-16T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6d06b7ef31ef0b56d4fb
Added to database: 2/25/2026, 9:43:34 PM
Last enriched: 2/28/2026, 7:32:26 AM
Last updated: 4/12/2026, 3:44:45 PM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.