CVE-2025-8524: Improper Export of Android Application Components in Boquan DotWallet App
A vulnerability was found in Boquan DotWallet App 2.15.2 on Android and classified as problematic. Affected by this issue is some unknown functionality of the file AndroidManifest.xml of the component com.boquanhash.dotwallet. The manipulation leads to improper export of android application components. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-8524 is a medium-severity vulnerability identified in version 2.15.2 of the Boquan DotWallet Android application. The root cause lies in the improper export of Android application components declared in the AndroidManifest.xml file, specifically within the component com.boquanhash.dotwallet. Improper export means that certain components intended for internal use are mistakenly made accessible to other applications or processes on the device. This misconfiguration can allow a local attacker—someone with physical or logical access to the device—to interact with these components in unintended ways, potentially leading to unauthorized access or manipulation of application functionality or data. The attack vector requires local access, meaning remote exploitation is not feasible without prior compromise. The vulnerability does not require user interaction or elevated privileges beyond limited local permissions, which lowers the barrier for exploitation. The vendor was notified but has not responded or provided a patch, and while the exploit details have been publicly disclosed, there are no known exploits actively used in the wild at this time. The CVSS 4.0 base score is 4.8, reflecting a medium severity level due to the limited attack vector (local), low complexity, and partial impact on confidentiality, integrity, and availability. The vulnerability affects a specific version of the DotWallet app, a cryptocurrency wallet application, which may store sensitive financial information and private keys, increasing the potential impact of exploitation.
Potential Impact
For European organizations, especially those involved in financial services, cryptocurrency trading, or digital asset management, this vulnerability poses a risk of unauthorized local access to sensitive wallet components. If exploited, attackers could potentially manipulate wallet operations, access private keys, or interfere with transaction processes, leading to financial loss or data compromise. Organizations with employees or clients using the affected DotWallet app on Android devices could face increased insider threat risks or device theft scenarios where attackers leverage this vulnerability. The local attack requirement limits the threat to scenarios involving physical device access or prior compromise, but the sensitive nature of wallet applications amplifies the potential damage. Additionally, the lack of vendor response and patch availability prolongs exposure, increasing the window for potential exploitation. This vulnerability could also undermine trust in digital wallet solutions within European markets, impacting adoption and regulatory compliance efforts related to data protection and financial security.
Mitigation Recommendations
European organizations should take proactive steps beyond generic patching advice. First, identify and inventory all Android devices running Boquan DotWallet version 2.15.2 within their environment. Immediately restrict physical access to these devices and enforce strict device usage policies. Where possible, migrate users to alternative, more secure wallet applications with active vendor support and regular security updates. Employ mobile device management (MDM) solutions to enforce application whitelisting and control app permissions, limiting the ability of other apps to interact with DotWallet components. Educate users about the risks of local exploitation and the importance of device security, including strong lock screens and encryption. Monitor for unusual local activity or privilege escalations on devices with the affected app. Since no patch is currently available, consider isolating or removing the vulnerable app from critical devices until a vendor fix is released. Finally, maintain communication with the vendor and monitor security advisories for updates or patches addressing this vulnerability.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Finland
CVE-2025-8524: Improper Export of Android Application Components in Boquan DotWallet App
Description
A vulnerability was found in Boquan DotWallet App 2.15.2 on Android and classified as problematic. Affected by this issue is some unknown functionality of the file AndroidManifest.xml of the component com.boquanhash.dotwallet. The manipulation leads to improper export of android application components. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-8524 is a medium-severity vulnerability identified in version 2.15.2 of the Boquan DotWallet Android application. The root cause lies in the improper export of Android application components declared in the AndroidManifest.xml file, specifically within the component com.boquanhash.dotwallet. Improper export means that certain components intended for internal use are mistakenly made accessible to other applications or processes on the device. This misconfiguration can allow a local attacker—someone with physical or logical access to the device—to interact with these components in unintended ways, potentially leading to unauthorized access or manipulation of application functionality or data. The attack vector requires local access, meaning remote exploitation is not feasible without prior compromise. The vulnerability does not require user interaction or elevated privileges beyond limited local permissions, which lowers the barrier for exploitation. The vendor was notified but has not responded or provided a patch, and while the exploit details have been publicly disclosed, there are no known exploits actively used in the wild at this time. The CVSS 4.0 base score is 4.8, reflecting a medium severity level due to the limited attack vector (local), low complexity, and partial impact on confidentiality, integrity, and availability. The vulnerability affects a specific version of the DotWallet app, a cryptocurrency wallet application, which may store sensitive financial information and private keys, increasing the potential impact of exploitation.
Potential Impact
For European organizations, especially those involved in financial services, cryptocurrency trading, or digital asset management, this vulnerability poses a risk of unauthorized local access to sensitive wallet components. If exploited, attackers could potentially manipulate wallet operations, access private keys, or interfere with transaction processes, leading to financial loss or data compromise. Organizations with employees or clients using the affected DotWallet app on Android devices could face increased insider threat risks or device theft scenarios where attackers leverage this vulnerability. The local attack requirement limits the threat to scenarios involving physical device access or prior compromise, but the sensitive nature of wallet applications amplifies the potential damage. Additionally, the lack of vendor response and patch availability prolongs exposure, increasing the window for potential exploitation. This vulnerability could also undermine trust in digital wallet solutions within European markets, impacting adoption and regulatory compliance efforts related to data protection and financial security.
Mitigation Recommendations
European organizations should take proactive steps beyond generic patching advice. First, identify and inventory all Android devices running Boquan DotWallet version 2.15.2 within their environment. Immediately restrict physical access to these devices and enforce strict device usage policies. Where possible, migrate users to alternative, more secure wallet applications with active vendor support and regular security updates. Employ mobile device management (MDM) solutions to enforce application whitelisting and control app permissions, limiting the ability of other apps to interact with DotWallet components. Educate users about the risks of local exploitation and the importance of device security, including strong lock screens and encryption. Monitor for unusual local activity or privilege escalations on devices with the affected app. Since no patch is currently available, consider isolating or removing the vulnerable app from critical devices until a vendor fix is released. Finally, maintain communication with the vendor and monitor security advisories for updates or patches addressing this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-04T06:37:00.383Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68911568ad5a09ad00e300c9
Added to database: 8/4/2025, 8:17:44 PM
Last enriched: 8/4/2025, 8:32:42 PM
Last updated: 8/4/2025, 8:32:42 PM
Views: 2
Related Threats
CVE-2025-8527: Server-Side Request Forgery in Exrick xboot
MediumCVE-2025-7844: CWE-121 in wolfSSL Inc. wolfTPM
LowCVE-2025-4599: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
LowCVE-2025-8526: Unrestricted Upload in Exrick xboot
MediumCVE-2025-50754: n/a
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.