Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10716: Improper Export of Android Application Components in Creality Cloud App

0
Medium
VulnerabilityCVE-2025-10716cvecve-2025-10716
Published: Fri Sep 19 2025 (09/19/2025, 14:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Creality
Product: Cloud App

Description

A flaw has been found in Creality Cloud App up to 6.1.0 on Android. Affected by this vulnerability is an unknown functionality of the file AndroidManifest.xml of the component com.cxsw.sdprinter. Executing manipulation can lead to improper export of android application components. It is possible to launch the attack on the local host. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/19/2025, 14:45:56 UTC

Technical Analysis

CVE-2025-10716 is a medium-severity vulnerability affecting the Creality Cloud App versions up to 6.1.0 on Android devices. The flaw resides in the AndroidManifest.xml configuration of the component com.cxsw.sdprinter, where improper export settings allow unauthorized access to application components. Specifically, this vulnerability arises from the incorrect export of Android application components, which can be manipulated by an attacker with local access to the device. The vulnerability does not require user interaction and can be exploited with low attack complexity, but it does require low-level privileges on the device (PR:L). The improper export could allow an attacker to interact with or manipulate the vulnerable component, potentially leading to unauthorized information disclosure or limited integrity compromise within the app's context. The CVSS 4.0 vector indicates local attack vector (AV:L), low attack complexity (AC:L), no privileges required for attack (AT:N), low privileges required (PR:L), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vendor, Creality, has not responded to the disclosure, and no patches are currently available. Although the exploit has been published, there are no known exploits in the wild at this time. The vulnerability is limited to Android devices running the affected versions of the Creality Cloud App, which is used primarily for managing 3D printing devices manufactured by Creality.

Potential Impact

For European organizations, the impact of this vulnerability is primarily relevant to those using Creality 3D printers managed via the Creality Cloud App on Android devices. The improper export of application components could allow a local attacker or malicious app on the same device to interact with the vulnerable component, potentially leading to unauthorized access to sensitive information or manipulation of printer settings. While the impact on confidentiality, integrity, and availability is rated low, exploitation could disrupt 3D printing operations or leak proprietary printing data, which may be critical for manufacturing, prototyping, or research organizations relying on Creality printers. Given the local attack vector, the threat is more significant in environments where devices are shared, or where users may inadvertently install malicious applications. The lack of vendor response and absence of patches increases the risk exposure until mitigations are applied. The vulnerability does not pose a direct network threat but could be leveraged as part of a multi-stage attack within a compromised device.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first restrict physical and local access to Android devices running the Creality Cloud App to trusted users only. Avoid installing untrusted or unnecessary applications on these devices to reduce the risk of local privilege escalation or component manipulation. Until an official patch is released, consider using alternative management methods for Creality 3D printers that do not rely on the vulnerable app version, such as direct USB connections or alternative software solutions. Monitoring device behavior for unusual activity related to the Creality Cloud App can help detect exploitation attempts. Additionally, organizations should implement mobile device management (MDM) policies to enforce application whitelisting and restrict app permissions. Regularly check for vendor updates or security advisories to apply patches promptly once available. If feasible, isolate devices running the Creality Cloud App on segmented networks to limit lateral movement in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-19T08:29:22.669Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68cd6bdc148332b17b6b8938

Added to database: 9/19/2025, 2:42:36 PM

Last enriched: 9/19/2025, 2:45:56 PM

Last updated: 11/2/2025, 6:49:44 AM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats