Skip to main content

CVE-2025-7891: Improper Export of Android Application Components in InstantBits Web Video Cast App

Medium
VulnerabilityCVE-2025-7891cvecve-2025-7891
Published: Sun Jul 20 2025 (07/20/2025, 13:02:05 UTC)
Source: CVE Database V5
Vendor/Project: InstantBits
Product: Web Video Cast App

Description

A vulnerability was found in InstantBits Web Video Cast App up to 5.12.4 on Android. It has been rated as problematic. Affected by this issue is some unknown functionality of the file AndroidManifest.xml of the component com.instantbits.cast.webvideo. The manipulation leads to improper export of android application components. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 07/20/2025, 13:31:09 UTC

Technical Analysis

CVE-2025-7891 is a medium-severity vulnerability affecting the InstantBits Web Video Cast App versions 5.12.0 through 5.12.4 on the Android platform. The root cause lies in the improper export of Android application components defined within the AndroidManifest.xml file, specifically related to the component com.instantbits.cast.webvideo. Improper export means that components such as activities, services, or broadcast receivers are made accessible to other apps or processes without adequate access controls. This can allow a local attacker—someone with physical or logical access to the device—to interact with these components in unintended ways. The vulnerability does not require user interaction but does require local access and low privileges, making exploitation somewhat limited in scope. The CVSS 4.0 vector (AV:L/AC:L/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P) indicates local attack vector, low complexity, low privileges required, no user interaction, and partial impacts on confidentiality, integrity, and availability. The vendor was notified but did not respond, and no patches or mitigations have been published yet. While no known exploits are currently in the wild, the public disclosure of the vulnerability increases the risk of exploitation attempts. The vulnerability could allow an attacker to access or manipulate app components, potentially leading to unauthorized data access, privilege escalation within the app context, or disruption of app functionality.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on the use of the InstantBits Web Video Cast App within their environments. Organizations that allow or rely on this app on employee devices could face risks of unauthorized access to sensitive data handled by the app or disruption of services provided by the app. Since the attack requires local access and low privileges, the threat is more relevant in scenarios where devices are shared, lost, or physically accessible by malicious insiders or third parties. The partial compromise of confidentiality, integrity, and availability could lead to leakage of sensitive streaming data or manipulation of app behavior, which may affect user privacy and operational continuity. In sectors with strict data protection regulations such as GDPR, any unauthorized data access could result in compliance issues and reputational damage. However, the medium severity and local attack vector limit the overall impact to organizations that do not control device access or have weak endpoint security controls.

Mitigation Recommendations

1. Immediate mitigation should focus on restricting physical and logical access to devices running the affected app, including enforcing strong device lock mechanisms and endpoint security policies. 2. Organizations should audit the use of the InstantBits Web Video Cast App on corporate and BYOD devices and consider restricting or removing it until a patch is available. 3. Monitor for unusual app behavior or unauthorized inter-app communications that could indicate exploitation attempts. 4. Employ mobile device management (MDM) solutions to enforce app permissions and restrict installation of vulnerable app versions. 5. Encourage users to update the app promptly once the vendor releases a patched version. 6. If feasible, review the AndroidManifest.xml of the app (for custom or in-house deployments) to ensure components are not unnecessarily exported. 7. Educate users about the risks of local device access and the importance of securing their devices against unauthorized physical access.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-19T10:51:45.599Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687cec15a83201eaac028ab1

Added to database: 7/20/2025, 1:16:05 PM

Last enriched: 7/20/2025, 1:31:09 PM

Last updated: 7/20/2025, 1:31:09 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats