CVE-2025-7940

5.3 MEDIUM

📋 TL;DR

This vulnerability in Genshin Albedo Cat House App 1.0.2 for Android allows improper export of application components via AndroidManifest.xml manipulation. Attackers with local access can exploit this to potentially access sensitive app data or functionality. Only Android users of this specific app version are affected.

💻 Affected Systems

Products:
  • Genshin Albedo Cat House App
Versions: 1.0.2
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Android version 1.0.2 of this specific app. Requires app to be installed and local access to device.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains unauthorized access to sensitive app data or functionality, potentially leading to data theft or privilege escalation within the app context.

🟠

Likely Case

Local attacker accesses non-critical app components or data, causing limited information disclosure or minor functionality abuse.

🟢

If Mitigated

With proper Android security controls and app sandboxing, impact is limited to the app's own data with minimal system-wide consequences.

🌐 Internet-Facing: LOW - Requires local access to device, not remotely exploitable over network.
🏢 Internal Only: MEDIUM - Local access required, but could be exploited by malicious apps or users with physical access to device.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires local access to device. Proof of concept video available in references. Attack complexity is low once local access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None found

Restart Required: No

Instructions:

No official patch available. Users should uninstall the vulnerable app version and monitor for updates from the developer.

🔧 Temporary Workarounds

Uninstall vulnerable app

android

Remove the vulnerable app version from Android devices

Settings > Apps > Genshin Albedo Cat House > Uninstall

Restrict app permissions

android

Limit app permissions to minimum required functionality

Settings > Apps > Genshin Albedo Cat House > Permissions > Disable unnecessary permissions

🧯 If You Can't Patch

  • Isolate device from sensitive networks and data
  • Implement strict physical access controls to prevent local exploitation

🔍 How to Verify

Check if Vulnerable:

Check app version in Android settings: Settings > Apps > Genshin Albedo Cat House > App info. If version is 1.0.2, device is vulnerable.

Check Version:

adb shell dumpsys package com.house.auscat | grep versionName

Verify Fix Applied:

Verify app is uninstalled or updated to version later than 1.0.2. Check app is no longer present in installed apps list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual activity from com.house.auscat package
  • Permission escalation attempts within app sandbox

Network Indicators:

  • None - local vulnerability only

SIEM Query:

source="android_logs" package="com.house.auscat" AND (event="permission_violation" OR event="component_export")

🔗 References

📤 Share & Export