Malicious Android Photo Frame App Gives Hackers Full Device Control Without User Action
These vulnerabilities affect popular low-cost Android picture frames sold under various brands, posing a grave risk to unsuspecting consumers.
Researchers found that the pre-installed Uhale app, installed on numerous digital photo frames, silently downloads and executes malware as part of its regular operation immediately upon booting or updating.
Hackers exploit insecure connections and unverified certificate handling to inject remote code directly into the device without any interaction from the owner.
In practice, an attacker intercepting network traffic, often on a public Wi-Fi or an untrusted LAN, can inject a tampered, encrypted payload into the device, resulting in immediate remote code execution (RCE) with full system privileges.
This RCE attack is so critical that it earns a CVSS 4.0 score of 9.4 (Critical). Once compromised, attackers can access private photos, recruit devices for botnets, exfiltrate sensitive data, and move laterally to attack other devices on the same network.
Notably, these devices often run outdated Android versions (6.0/6.0.1) with SELinux disabled and rooted by default, making privilege escalation trivial and persistent malware installation almost sure.
Furthermore, firmware and system apps are signed with publicly known test-keys, allowing unauthorized software to be easily installed and run as system-level services.
Beyond remote attacks, threat actors can leverage another flaw: the Uhale app’s unsecured local network file transfer feature. Once the frame joins a Wi-Fi network, it listens for incoming upload requests on a fixed TCP port but performs no authentication or file type checks.
Attackers on the same network can send crafted files, including executable code, or even delete arbitrary files just by sending a malformed request.
This attack vector enables arbitrary file writes and deletions anywhere the Uhale app has system privileges, resulting in compromised device integrity and additional exploit opportunities such as denial-of-service and privilege escalation.
These vulnerabilities require no interaction; owners aren’t prompted and don’t need to accept any requests.
The systemic weaknesses identified by researchers highlight the widespread risks posed by neglected software security in consumer electronics.
The findings urge manufacturers to switch to modern Android builds, enable security features like SELinux, validate SSL/TLS certificates, and require strict authentication on all network interfaces.
For now, users of affected picture frames should assume risks are present and, where possible, disconnect or update devices to limit exposure.
Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates
The post Malicious Android Photo Frame App Gives Hackers Full Device Control Without User Action appeared first on Cyber Security News.
The Star Trek franchise is at a moment of uncertainty: For the first time since…
The Star Trek franchise is at a moment of uncertainty: For the first time since…
The Star Trek franchise is at a moment of uncertainty: For the first time since…
Marvel Studios will return for San Diego Comic-Con 2026. According to The Wrap, Marvel will…
Marvel Studios will return for San Diego Comic-Con 2026. According to The Wrap, Marvel will…
Marvel Studios will return for San Diego Comic-Con 2026. According to The Wrap, Marvel will…
This website uses cookies.