CVE-2025-8745

5.3 MEDIUM

📋 TL;DR

This vulnerability in Weee RICEPO App 6.17.77 on Android allows improper export of Android application components via AndroidManifest.xml manipulation. Attackers with local access can potentially access sensitive app components, affecting users of this specific Android app version.

💻 Affected Systems

Products:
  • Weee RICEPO App
Versions: 6.17.77
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Android version 6.17.77 of the Weee RICEPO App; requires app to be installed and running.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains unauthorized access to sensitive app components, potentially leading to data theft or privilege escalation within the app.

🟠

Likely Case

Limited information disclosure or unauthorized access to non-critical app components by users with physical device access.

🟢

If Mitigated

Minimal impact if app is not installed or proper device security controls prevent unauthorized local access.

🌐 Internet-Facing: LOW - Requires local access to device, not remotely exploitable.
🏢 Internal Only: MEDIUM - Local attackers with device access could exploit, but requires specific app version and configuration.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploit details publicly disclosed; requires local access to Android device and knowledge of Android component manipulation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: UNKNOWN

Vendor Advisory: NONE

Restart Required: No

Instructions:

No official patch available; vendor did not respond to disclosure. Consider removing the app until updated version is released.

🔧 Temporary Workarounds

Uninstall vulnerable app

android

Remove Weee RICEPO App 6.17.77 from Android devices

adb uninstall com.ricepo.app

Restrict app permissions

android

Limit app permissions in Android settings to minimum required

🧯 If You Can't Patch

  • Implement device security controls to prevent unauthorized local access
  • Monitor for suspicious app activity or unauthorized component access attempts

🔍 How to Verify

Check if Vulnerable:

Check app version in Android settings > Apps > Weee RICEPO App > App info

Check Version:

adb shell dumpsys package com.ricepo.app | grep versionName

Verify Fix Applied:

Verify app is uninstalled or updated to version later than 6.17.77

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to com.ricepo.app components in Android logs

Network Indicators:

  • N/A - Local vulnerability only

SIEM Query:

N/A - Local device-level monitoring required

🔗 References

📤 Share & Export