CVE-2025-8523

5.3 MEDIUM

📋 TL;DR

This vulnerability in RiderLike Fruit Crush-Brain App 1.0 for Android allows improper export of application components via AndroidManifest.xml, potentially enabling local attackers to access sensitive app functionality. Only users of this specific Android game app are affected. The vulnerability requires local access to the device.

💻 Affected Systems

Products:
  • RiderLike Fruit Crush-Brain App
Versions: 1.0
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Android devices with this specific app installed from unofficial sources.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains unauthorized access to app components, potentially accessing sensitive game data or functionality, though limited to the app's sandbox.

🟠

Likely Case

Limited information disclosure or unauthorized interaction with app components from other local apps.

🟢

If Mitigated

Minimal impact if app is not installed or proper Android permissions restrict component access.

🌐 Internet-Facing: LOW - Attack requires local access to device, not remotely exploitable.
🏢 Internal Only: MEDIUM - Local attackers on the same device could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploit details are publicly disclosed but require local access and knowledge of Android app development.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Vendor did not respond to disclosure. Remove the app as primary mitigation.

🔧 Temporary Workarounds

Uninstall vulnerable app

android

Remove the RiderLike Fruit Crush-Brain App from affected devices

adb uninstall com.fruitcrush.fun

Restrict app installation sources

android

Configure Android to only allow app installations from Google Play Store

Settings > Security > Unknown Sources (disable)

🧯 If You Can't Patch

  • Isolate affected devices from sensitive networks
  • Monitor for unusual app behavior or data access attempts

🔍 How to Verify

Check if Vulnerable:

Check if com.fruitcrush.fun package is installed: adb shell pm list packages | grep fruitcrush

Check Version:

adb shell dumpsys package com.fruitcrush.fun | grep versionName

Verify Fix Applied:

Verify app is no longer installed or check AndroidManifest.xml for proper component export settings

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to com.fruitcrush.fun components in Android logs

Network Indicators:

  • None - local vulnerability only

SIEM Query:

App package com.fruitcrush.fun AND (component access OR permission violation)

🔗 References

📤 Share & Export