CVE-2025-5346: CWE-926 Improper Export of Android Application Components in Bluebird kr.co.bluebird.android.bbsettings
Bluebird devices contain a pre-loaded barcode scanner application. This application exposes an unsecured broadcast receiver "kr.co.bluebird.android.bbsettings.BootReceiver". A local attacker can call the receiver to overwrite file containing ".json" keyword with default barcode config file. It is possible to overwrite file in any location due to lack of protection against path traversal in name of the file. This issue affects all versions before 1.3.3.
AI Analysis
Technical Summary
CVE-2025-5346 is a medium-severity vulnerability affecting the Bluebird Android application 'kr.co.bluebird.android.bbsettings', which is pre-installed on Bluebird barcode scanner devices. The vulnerability arises from an improperly secured broadcast receiver component named 'kr.co.bluebird.android.bbsettings.BootReceiver'. This receiver is exposed without adequate access controls, allowing a local attacker to invoke it and trigger a file overwrite operation. Specifically, the attacker can overwrite files containing the '.json' keyword, which are used as default barcode configuration files. Due to insufficient validation of file paths, the vulnerability permits path traversal attacks, enabling the attacker to overwrite arbitrary files anywhere on the device's filesystem. This can lead to unauthorized modification of configuration or system files, potentially disrupting device functionality or enabling further exploitation. The vulnerability affects all versions of the application prior to 1.3.3. The CVSS 4.0 base score is 5.1 (medium), reflecting that the attack vector is local (AV:L), requires low attack complexity (AC:L), no privileges (PR:N), no user interaction (UI:N), and no confidentiality, integrity, or availability impact directly, but with limited scope impact (SI:L). No known exploits are currently reported in the wild.
Potential Impact
For European organizations using Bluebird barcode scanner devices, particularly in sectors like logistics, retail, manufacturing, and healthcare where such devices are integral to operations, this vulnerability poses a risk of local privilege abuse or sabotage. An attacker with local access—such as an insider, contractor, or someone with temporary physical access—could exploit this flaw to overwrite critical configuration files, potentially causing device misconfiguration, operational disruption, or enabling further malicious activities. While the vulnerability does not directly allow remote exploitation or data exfiltration, the ability to modify device configuration files could lead to denial of service or undermine the integrity of scanned data, impacting supply chain accuracy and operational reliability. Given the specialized nature of the devices, the impact is more pronounced in environments where device availability and data integrity are critical. Additionally, compromised devices could be leveraged as footholds within secure facilities, increasing overall organizational risk.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately update the 'kr.co.bluebird.android.bbsettings' application to version 1.3.3 or later where the vulnerability is patched. 2) Restrict physical and local access to Bluebird devices to trusted personnel only, enforcing strict access controls and monitoring. 3) Implement device usage policies that limit installation or execution of unauthorized applications that could exploit local vulnerabilities. 4) Use Mobile Device Management (MDM) solutions to monitor device integrity and detect unauthorized changes to configuration files. 5) Conduct regular audits of device configurations and logs to identify suspicious activities. 6) If patching is delayed, consider disabling or restricting the vulnerable broadcast receiver component via device configuration or custom security policies, if feasible. 7) Train staff on the importance of device security and the risks of local exploitation. These steps go beyond generic advice by focusing on access control, monitoring, and device management tailored to the operational context of Bluebird devices.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium
CVE-2025-5346: CWE-926 Improper Export of Android Application Components in Bluebird kr.co.bluebird.android.bbsettings
Description
Bluebird devices contain a pre-loaded barcode scanner application. This application exposes an unsecured broadcast receiver "kr.co.bluebird.android.bbsettings.BootReceiver". A local attacker can call the receiver to overwrite file containing ".json" keyword with default barcode config file. It is possible to overwrite file in any location due to lack of protection against path traversal in name of the file. This issue affects all versions before 1.3.3.
AI-Powered Analysis
Technical Analysis
CVE-2025-5346 is a medium-severity vulnerability affecting the Bluebird Android application 'kr.co.bluebird.android.bbsettings', which is pre-installed on Bluebird barcode scanner devices. The vulnerability arises from an improperly secured broadcast receiver component named 'kr.co.bluebird.android.bbsettings.BootReceiver'. This receiver is exposed without adequate access controls, allowing a local attacker to invoke it and trigger a file overwrite operation. Specifically, the attacker can overwrite files containing the '.json' keyword, which are used as default barcode configuration files. Due to insufficient validation of file paths, the vulnerability permits path traversal attacks, enabling the attacker to overwrite arbitrary files anywhere on the device's filesystem. This can lead to unauthorized modification of configuration or system files, potentially disrupting device functionality or enabling further exploitation. The vulnerability affects all versions of the application prior to 1.3.3. The CVSS 4.0 base score is 5.1 (medium), reflecting that the attack vector is local (AV:L), requires low attack complexity (AC:L), no privileges (PR:N), no user interaction (UI:N), and no confidentiality, integrity, or availability impact directly, but with limited scope impact (SI:L). No known exploits are currently reported in the wild.
Potential Impact
For European organizations using Bluebird barcode scanner devices, particularly in sectors like logistics, retail, manufacturing, and healthcare where such devices are integral to operations, this vulnerability poses a risk of local privilege abuse or sabotage. An attacker with local access—such as an insider, contractor, or someone with temporary physical access—could exploit this flaw to overwrite critical configuration files, potentially causing device misconfiguration, operational disruption, or enabling further malicious activities. While the vulnerability does not directly allow remote exploitation or data exfiltration, the ability to modify device configuration files could lead to denial of service or undermine the integrity of scanned data, impacting supply chain accuracy and operational reliability. Given the specialized nature of the devices, the impact is more pronounced in environments where device availability and data integrity are critical. Additionally, compromised devices could be leveraged as footholds within secure facilities, increasing overall organizational risk.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately update the 'kr.co.bluebird.android.bbsettings' application to version 1.3.3 or later where the vulnerability is patched. 2) Restrict physical and local access to Bluebird devices to trusted personnel only, enforcing strict access controls and monitoring. 3) Implement device usage policies that limit installation or execution of unauthorized applications that could exploit local vulnerabilities. 4) Use Mobile Device Management (MDM) solutions to monitor device integrity and detect unauthorized changes to configuration files. 5) Conduct regular audits of device configurations and logs to identify suspicious activities. 6) If patching is delayed, consider disabling or restricting the vulnerable broadcast receiver component via device configuration or custom security policies, if feasible. 7) Train staff on the importance of device security and the risks of local exploitation. These steps go beyond generic advice by focusing on access control, monitoring, and device management tailored to the operational context of Bluebird devices.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- CERT-PL
- Date Reserved
- 2025-05-30T06:40:16.684Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6878f79ba83201eaace5cfab
Added to database: 7/17/2025, 1:16:11 PM
Last enriched: 7/17/2025, 1:31:23 PM
Last updated: 8/29/2025, 4:44:59 PM
Views: 25
Related Threats
CVE-2025-9679: SQL Injection in itsourcecode Student Information System
MediumCVE-2025-9500: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tobiasbg TablePress – Tables in WordPress made easy
MediumCVE-2025-9499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in oceanwp Ocean Extra
MediumCVE-2025-54946: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in SUNNET Technology Co., Ltd. Corporate Training Management System
CriticalCVE-2025-54945: CWE-73: External Control of File Name or Path in SUNNET Technology Co., Ltd. Corporate Training Management System
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.