CVE-2025-5500

5.3 MEDIUM

📋 TL;DR

This vulnerability allows improper export of Android application components in the ZhenShi Mibro Fit App, enabling local attackers to access sensitive app functionality without proper authorization. It affects Android users running Mibro Fit App version 1.6.3.17499. The attack requires physical access to the device or malware with local permissions.

💻 Affected Systems

Products:
  • ZhenShi Mibro Fit App
Versions: 1.6.3.17499
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific Android app version mentioned; other versions may also be vulnerable but not confirmed.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with local access could execute arbitrary code within the app's context, access sensitive user data, or perform unauthorized actions through exported components.

🟠

Likely Case

Malicious apps on the same device could exploit exported components to access fitness data, user information, or perform unauthorized operations within the Mibro Fit App.

🟢

If Mitigated

With proper Android permission controls and app sandboxing, impact is limited to data within the vulnerable app only.

🌐 Internet-Facing: LOW - The vulnerability requires local access to the device, not remote exploitation.
🏢 Internal Only: MEDIUM - Local access required, but malware or malicious apps could exploit this from within the device.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploit details are published in GitHub repositories, but exploitation requires local access to the device.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: UNKNOWN

Vendor Advisory: NONE

Restart Required: No

Instructions:

No official patch available. Vendor did not respond to disclosure. Consider uninstalling the app or using alternative fitness apps.

🔧 Temporary Workarounds

Uninstall vulnerable app

Android

Remove the Mibro Fit App from affected Android devices

adb uninstall com.xiaoxun.xunoversea.mibrofit

Restrict app permissions

Android

Review and restrict all permissions for the Mibro Fit App in Android settings

🧯 If You Can't Patch

  • Isolate device from sensitive networks and data
  • Monitor for suspicious activity from the Mibro Fit App

🔍 How to Verify

Check if Vulnerable:

Check app version in Android Settings > Apps > Mibro Fit > App info

Check Version:

adb shell dumpsys package com.xiaoxun.xunoversea.mibrofit | grep versionName

Verify Fix Applied:

Verify app is uninstalled or updated to a version later than 1.6.3.17499

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized component access attempts in Android system logs
  • Suspicious activity from com.xiaoxun.xunoversea.mibrofit package

Network Indicators:

  • Unexpected network traffic from Mibro Fit App

SIEM Query:

source="android" AND package="com.xiaoxun.xunoversea.mibrofit" AND (event="component_access" OR event="permission_violation")

🔗 References

📤 Share & Export