{ "schema_version": "1.4.0", "id": "GHSA-jqqr-xgvg-2x5c", "modified": "2022-05-24T17:01:10Z", "published": "2022-05-24T17:01:10Z", "aliases": [ "CVE-2019-15425" ], "details": "The Kata M4s Android device with a build fingerprint of alps/full_hct6750_66_n/hct6750_66_n:7.0/NRD90M/1495624556:user/test-keys contains a pre-installed app with a package name of com.mediatek.factorymode app (versionCode=1, versionName=1) that allows unauthorized wireless settings modification via a confused deputy attack. This capability can be accessed by any app co-located on the device.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15425" }, { "type": "WEB", "url": "https://www.kryptowire.com/android-firmware-2019" } ], "database_specific": { "cwe_ids": [], "severity": "LOW", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-11-14T17:15:00Z" } }