漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
An issue was discovered on Orbic Wonder Orbic/RC555L/RC555L:7.1.2/N2G47H/329100b:user/release-keys devices. Any app co-located on the device can send an intent to factory reset the device programmatically because of com.android.server.MasterClearReceiver. This does not require any user interaction and does not require any permission to perform. A factory reset will remove all user data from the device. This will result in the loss of any data that the user has not backed up or synced externally. This capability to perform a factory reset is not directly available to third-party apps (those that the user installs themselves), although this capability is present in an unprotected component of the Android OS. This vulnerability is not present in Google's Android Open Source Project (AOSP) code. Therefore, it was introduced by Orbic or another entity in the supply chain.
漏洞信息
N/A
漏洞
N/A
漏洞
Orbic Wonder 安全漏洞
漏洞信息
Orbic Wonder是美国Orbic公司的一款智能手机产品。 Orbic Wonder的Orbic/RC555L/RC555L:7.1.2/N2G47H/329100b:user/release-keys中存在安全漏洞。攻击者可借助com.android.server.MasterClearReceiver利用该漏洞以编程方式将设备恢复出厂设置,移除设备中的所有用户数据,造成用户数据丢失。
漏洞信息
N/A
漏洞
N/A