The SmartRemote module has insufficient restrictions on loading URLs, which may lead to some information leakage.
The wallet has an authentication bypass vulnerability that allows access to specific pages.
The wifi module exposes the interface and has improper permission control, leaking sensitive information about the device.
Locally installed application can bypass the permission check and perform system operations that require permission.
The MinigameCenter module has insufficient restrictions on loading URLs, which may lead to some information leakage.
The MinigameCenter module has insufficient restrictions on loading URLs, which may lead to some information leakage.
The health module has insufficient restrictions on loading URLs, which may lead to some information leakage.
Improper handling of WiFi information by framework services can allow certain malicious applications to obtain sensitive information.
Improper control of framework service permissions with possibility of some sensitive device information leakage.
When using special mode to connect to enterprise wifi, certain options are not properly configured and attackers can pretend to be enterprise wifi through a carefully constructed wifi with the same name, which can lead to man-in-the-middle attacks.
The “socket” module provides a pure-Python fallback to the socket.socketpair() function for platforms that don’t support AF_UNIX, such as Windows. This pure-Python implementation uses AF_INET or AF_INET6 to create a local connected pair of sockets. The connection between the two sockets was not verified before passing the two sockets back to the user, which leaves the server socket vulnerable to a connection race from a malicious local peer. Platforms that support AF_UNIX such as Linux and macOS are not affected by this vulnerability. Versions prior to CPython 3.5 are not affected due to the vulnerable API not being included.