Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2025-43976
Analyzed
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-21 Jul, 2025 | 15:15
Updated At-07 Aug, 2025 | 18:12

The com.enflick.android.tn2ndLine application through 24.17.1.0 for Android enables any installed application (with no permissions) to place phone calls without user interaction by sending a crafted intent via the com.enflick.android.TextNow.activities.DialerActivity component.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Secondary3.14.3MEDIUM
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
CPE Matches

textnow
textnow
>>2ndline>>24.17.1.0
cpe:2.3:a:textnow:2ndline:24.17.1.0:*:*:*:*:android:*:*
Weaknesses
CWE IDTypeSource
CWE-862Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/actuator/com.enflick.android.tn2ndLinecve@mitre.org
Exploit
https://github.com/actuator/com.enflick.android.tn2ndLine/blob/main/CVE-2025-43976cve@mitre.org
Third Party Advisory
https://play.google.com/store/apps/details?id=com.enflick.android.tn2ndLinecve@mitre.org
Product
Change History
0Changes found

Details not found