CVE-2025-9677: Improper Export of Android Application Components in Modo Legend of the Phoenix
A security flaw has been discovered in Modo Legend of the Phoenix up to 1.0.5. The affected element is an unknown function of the file AndroidManifest.xml of the component com.duige.hzw.multilingual. The manipulation results in improper export of android application components. The attack needs to be approached locally. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-9677 is a medium-severity vulnerability affecting the Android application 'Modo Legend of the Phoenix' versions 1.0.0 through 1.0.5. The flaw arises from improper exportation of Android application components defined in the AndroidManifest.xml file, specifically within the component identified as com.duige.hzw.multilingual. Improper export means that components such as activities, services, or broadcast receivers are accessible to other applications or processes without appropriate restrictions. This can lead to unauthorized access or manipulation of the app's internal functions or data. The vulnerability requires local access to the device, meaning an attacker must have some level of access to the device environment, such as installing a malicious app or having physical access. The CVSS 4.0 vector indicates low attack complexity and privileges required, no user interaction, and partial impact on confidentiality, integrity, and availability. The vendor has not responded to the disclosure, and no patches are currently available. Although no known exploits are reported in the wild, the exploit code has been publicly released, increasing the risk of exploitation by local attackers. This vulnerability highlights a common Android security issue where developers inadvertently expose components that should remain private, enabling attackers to leverage these components to escalate privileges, access sensitive information, or disrupt app functionality.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the usage of the affected application within their environment. Since 'Modo Legend of the Phoenix' is an Android app, the risk is primarily to mobile devices where the app is installed. If the app is used in corporate or sensitive contexts, the improper export of components could allow local attackers or malicious apps to interfere with the app’s operations, potentially leading to data leakage or unauthorized actions within the app. The requirement for local access limits remote exploitation but does not eliminate risk, especially in environments where device security is lax or where users may install untrusted apps. In sectors such as finance, healthcare, or government within Europe, where mobile device security is critical, this vulnerability could be exploited to compromise confidentiality or integrity of data processed by the app. Additionally, the lack of vendor response and absence of patches increase the window of exposure. Organizations relying on this app should consider the risk of local privilege escalation or data exposure, particularly in BYOD (Bring Your Own Device) scenarios or where mobile devices are used to access corporate resources.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement several practical mitigations: 1) Restrict installation of the affected app to trusted users only and avoid its use on devices handling sensitive information. 2) Enforce strict mobile device management (MDM) policies that limit installation of untrusted or unnecessary applications and monitor app permissions and exported components. 3) Use Android security features such as application sandboxing and permission management to reduce the risk of local privilege escalation. 4) Educate users about the risks of installing unknown or untrusted apps that could exploit this vulnerability locally. 5) Monitor device behavior for suspicious activities that could indicate exploitation attempts, such as unexpected inter-app communications or unusual app behavior. 6) If feasible, consider alternative applications that do not exhibit this vulnerability. 7) Maintain up-to-date security posture by monitoring for vendor updates or community patches addressing this issue. 8) For developers or organizations with access to the app source, review and modify the AndroidManifest.xml to ensure components are not unnecessarily exported.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-9677: Improper Export of Android Application Components in Modo Legend of the Phoenix
Description
A security flaw has been discovered in Modo Legend of the Phoenix up to 1.0.5. The affected element is an unknown function of the file AndroidManifest.xml of the component com.duige.hzw.multilingual. The manipulation results in improper export of android application components. The attack needs to be approached locally. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-9677 is a medium-severity vulnerability affecting the Android application 'Modo Legend of the Phoenix' versions 1.0.0 through 1.0.5. The flaw arises from improper exportation of Android application components defined in the AndroidManifest.xml file, specifically within the component identified as com.duige.hzw.multilingual. Improper export means that components such as activities, services, or broadcast receivers are accessible to other applications or processes without appropriate restrictions. This can lead to unauthorized access or manipulation of the app's internal functions or data. The vulnerability requires local access to the device, meaning an attacker must have some level of access to the device environment, such as installing a malicious app or having physical access. The CVSS 4.0 vector indicates low attack complexity and privileges required, no user interaction, and partial impact on confidentiality, integrity, and availability. The vendor has not responded to the disclosure, and no patches are currently available. Although no known exploits are reported in the wild, the exploit code has been publicly released, increasing the risk of exploitation by local attackers. This vulnerability highlights a common Android security issue where developers inadvertently expose components that should remain private, enabling attackers to leverage these components to escalate privileges, access sensitive information, or disrupt app functionality.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the usage of the affected application within their environment. Since 'Modo Legend of the Phoenix' is an Android app, the risk is primarily to mobile devices where the app is installed. If the app is used in corporate or sensitive contexts, the improper export of components could allow local attackers or malicious apps to interfere with the app’s operations, potentially leading to data leakage or unauthorized actions within the app. The requirement for local access limits remote exploitation but does not eliminate risk, especially in environments where device security is lax or where users may install untrusted apps. In sectors such as finance, healthcare, or government within Europe, where mobile device security is critical, this vulnerability could be exploited to compromise confidentiality or integrity of data processed by the app. Additionally, the lack of vendor response and absence of patches increase the window of exposure. Organizations relying on this app should consider the risk of local privilege escalation or data exposure, particularly in BYOD (Bring Your Own Device) scenarios or where mobile devices are used to access corporate resources.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement several practical mitigations: 1) Restrict installation of the affected app to trusted users only and avoid its use on devices handling sensitive information. 2) Enforce strict mobile device management (MDM) policies that limit installation of untrusted or unnecessary applications and monitor app permissions and exported components. 3) Use Android security features such as application sandboxing and permission management to reduce the risk of local privilege escalation. 4) Educate users about the risks of installing unknown or untrusted apps that could exploit this vulnerability locally. 5) Monitor device behavior for suspicious activities that could indicate exploitation attempts, such as unexpected inter-app communications or unusual app behavior. 6) If feasible, consider alternative applications that do not exhibit this vulnerability. 7) Maintain up-to-date security posture by monitoring for vendor updates or community patches addressing this issue. 8) For developers or organizations with access to the app source, review and modify the AndroidManifest.xml to ensure components are not unnecessarily exported.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-29T10:28:58.703Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68b218fcad5a09ad007b7a34
Added to database: 8/29/2025, 9:17:48 PM
Last enriched: 9/7/2025, 12:36:32 AM
Last updated: 10/12/2025, 8:40:14 PM
Views: 46
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11645: Insecure Storage of Sensitive Information in Tomofun Furbo Mobile App
LowCVE-2025-11644: Insecure Storage of Sensitive Information in Tomofun Furbo 360
LowCVE-2025-11643: Hard-coded Credentials in Tomofun Furbo 360
MediumCVE-2025-11642: Denial of Service in Tomofun Furbo 360
MediumCVE-2025-11641: Improper Access Controls in Tomofun Furbo 360
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.