There is an unauthorized access vulnerability in some ZTE mobile phones. If a malicious application is installed on the phone, it could overwrite some system configuration files and user installers without user permission.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Blade_a52_firmware | Zte | * | m02 (excluding) |