Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-40002: CWE-269: Improper Privilege Management in ZTE Red Magic 11 Pro (NX809J)

0
Medium
VulnerabilityCVE-2026-40002cvecve-2026-40002cwe-269
Published: Fri Apr 17 2026 (04/17/2026, 07:40:58 UTC)
Source: CVE Database V5
Vendor/Project: ZTE
Product: Red Magic 11 Pro (NX809J)

Description

Red Magic 11 Pro (NX809J) contains a vulnerability that allows non-privileged applications to trigger sensitive operations. The vulnerability stems from the lack of validation for applications accessing the service interface. Exploiting this vulnerability, an attacker can write files to specific partitions and set writable system properties.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/17/2026, 08:32:10 UTC

Technical Analysis

CVE-2026-40002 is an improper privilege management vulnerability (CWE-269) in the ZTE Red Magic 11 Pro (NX809J) device, specifically version GEN_NEEA_NX809J V1.0.0B14MR1. It arises from insufficient validation of application privileges when accessing a service interface, enabling non-privileged applications to trigger sensitive operations such as writing files to certain partitions and setting writable system properties. The vulnerability has a CVSS 3.1 base score of 5.0 (AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L), reflecting a medium impact with local attack vector, high attack complexity, and requiring user interaction. No official remediation or patch is currently documented.

Potential Impact

Exploitation of this vulnerability allows a local attacker with limited privileges and user interaction to perform sensitive operations, including writing files to specific partitions and modifying writable system properties. This can lead to partial confidentiality, integrity, and availability impacts on the affected device. However, the attack complexity is high, and the attacker must have local access and user interaction to exploit the flaw. There are no known exploits in the wild.

Mitigation Recommendations

Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Since no official fix or remediation level has been provided by ZTE, users should monitor for vendor updates. Until a patch is available, restricting installation of untrusted applications and limiting local access to the device may reduce exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
zte
Date Reserved
2026-04-08T07:51:26.675Z
Cvss Version
3.1
State
PUBLISHED
Remediation Level
null

Threat ID: 69e1ec7982d89c981fa85cbe

Added to database: 4/17/2026, 8:16:57 AM

Last enriched: 4/17/2026, 8:32:10 AM

Last updated: 4/21/2026, 2:45:42 AM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses