There is an unauthorized access vulnerability in some ZTE mobile phones. If a malicious application is installed on the phone, it could start a non-public interface of an application without user...
3.3CVSS
4.3AI Score
0.0004EPSS
There is an unauthorized access vulnerability in some ZTE mobile phones. If a malicious application is installed on the phone, it could delete some system files without user...
7.1CVSS
6.8AI Score
0.0004EPSS
There is an unauthorized access vulnerability in some ZTE mobile phones. If a malicious application is installed on the phone, it could overwrite some system configuration files and user installers without user...
7.1CVSS
6.8AI Score
0.0004EPSS