There is an unauthorized access vulnerability in some ZTE mobile phones. If a malicious application is installed on the phone, it could overwrite some system configuration files and user installers without user permission.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Blade_a52_firmware | Zte | * | m02 (excluding) |