By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Popular Android-based photo frames download malware on boot
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Popular Android-based photo frames download malware on boot
Tech News

Popular Android-based photo frames download malware on boot

By admin 5 Min Read
Share
SHARE

Contents
Automatic malware deliveryMultiple security gaps

Uhale Android-based digital picture frames come with multiple critical security vulnerabilities and some of them download and execute malware at boot time.

Mobile security company Quokka conducted an in-depth security assessment on the Uhale app and found behavior suggesting a connection with the Mezmess and Voi1d malware families.

The researchers reported the issues to ZEASN (now ‘Whale TV’), the Chinese firm behind the Uhale platform used in the digital picture frames of numerous different brands, but received no reply to multiple notificaitions since May.

Wiz

Automatic malware delivery

Starting with the most alarming findings, many of the analyzed Uhale photo frames download malicious payloads from China-based servers at boot.

“Upon booting, many investigated frames check for and update to the Uhale app version 4.2.0,” Quokka researchers say in the report.

“The device then installs this new version and reboots. After the reboot, the updated Uhale app initiates the download and execution of malware.”

The downloaded JAR/DEX file that is saved under the Uhale app’s file directory is loaded and executed at every subsequent boot.

The devices that Quokka examined had the SELinux security module disabled, came rooted by default, and many system components were signed with AOSP test-keys.

Downloaded payloads
<strong>Downloaded payloads</strong><br /><em>Source: Quokka</em>

The researchers found evidence linking the downloaded payloads to the Vo1d botnet and Mzmess malware families, based on package prefixes, string names, endpoints, delivery workflow, and artifact locations.

However, it is unclear how the devices got infected.

Malware-loading workflow
<strong>Malware-loading workflow</strong><br /><em>Source: Quokka</em>

Multiple security gaps

Aside from the malware delivery, which did not occur on all Uhale-branded picture frames, the researchers also discovered more than a dozen vulnerabilities.

Among the 17 security issues that Quokka discloses in the report, 11 of which have CVE-IDs assigned, below are the most significant:

  • CVE-2025-58392 / CVE-2025-58397 – An insecure TrustManager implementation allows man-in-the-middle injection of forged encrypted responses, leading to remote code execution as root on affected devices.
  • CVE-2025-58388 – The app’s update process passes unsanitized filenames directly into shell commands, enabling command injection and remote installation of arbitrary APKs.
  • CVE-2025-58394 – All tested frames ship with SELinux disabled, are rooted by default, and use public AOSP test-keys, so they’re essentially fully compromised out of the box.
  • CVE-2025-58396 – The pre-installed app exposes a file server on TCP port 17802 that accepts unauthenticated uploads, allowing any local network host to write or delete arbitrary files.
  • CVE-2025-58390 – The app’s WebViews ignore SSL/TLS errors and permit mixed content, allowing attackers to inject or intercept data displayed on the device, enabling phishing or content spoofing.
  • Hardcoded AES key (DE252F9AC7624D723212E7E70972134D) used to decrypt sdkbin responses.
  • Several models include Adups update components and outdated libraries, while the app also uses weak crypto patterns and hardcoded keys, creating supply-chain risks.

Since most of these products are marketed and sold under various brands without mentioning the platform they use, it is difficult to estimate the exact number of potentially impacted users.

The Uhale app has more than 500,000 downloads on Google Play and 11,000 user reviews in the App Store. Uhale-branded photo frames on Amazon have nearly a thousand user reviews. 

BleepingComputer has independently contacted ZEASN with a request for comment, but we have not received a response by publication time.

It is recommended that consumers only buy electronic devices from reputable brands that use official Android images without firmware modifications, Google Play services, and built-in malware protections.

Wiz

As MCP (Model Context Protocol) becomes the standard for connecting LLMs to tools and data, security teams are moving fast to keep these new services safe.

This free cheat sheet outlines 7 best practices you can start using today.

You Might Also Like

Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale

Cloudflare outage disrupts X, OpenAI and more

xAI Grok 4.1, Better EQ, Fewer Hallucinations, Faster Logic

OnePlus 15R and New Smartwatch Teased

Le Wand Lick 3-in-1 Review: Three Times the Pleasure

TAGGED: Android, China, Hardware, Malware, Mzmess, Photo Frame, Vo1d, Vulnerability
Share This Article
Facebook Twitter Copy Link
Previous Article Should I buy Vodafone shares while they’re still under £1?
Next Article British Churches Are Putting Their Faith in Heat Pumps
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

World Cup fans could get US visa appointments fast-tracked – but entry still ‘not guaranteed’
Travel
What Binance’s Latest Partnership With BlackRock’s BUIDL Means For Crypto
Crypto
Today in History: November 18, Robert Blake ordered to pay $30 million in wife’s slaying
World News
Demonschool review: This Persona-like RPG needs remedial classes
Gaming News
Two Ukrainians working for Russia behind rail sabotage, Polish PM says
World News
Bitcoin wipeout: The huge crash no one saw coming
World News
Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale
Tech News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

World Cup fans could get US visa appointments fast-tracked – but entry still ‘not guaranteed’

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
World Cup fans could get US visa appointments fast-tracked – but entry still ‘not guaranteed’
November 18, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?