in OpenHarmony v3.2.4 and prior versions allow a remote attacker bypass permission verification to install apps, although these require user action.
This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.