Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2016-6564


Android devices with code from Ragentek contain a privileged binary that performs over-the-air (OTA) update checks. Additionally, there are multiple techniques used to hide the execution of this binary. This behavior could be described as a rootkit. This binary, which resides as /system/bin/debugs, runs with root privileges and does not communicate over an encrypted channel. The binary has been shown to communicate with three hosts via HTTP: oyag[.]lhzbdvm[.]com oyag[.]prugskh[.]net oyag[.]prugskh[.]com Server responses to requests sent by the debugs binary include functionalities to execute arbitrary commands as root, install applications, or update configurations. Examples of a request sent by the client binary: POST /pagt/agent?data={"name":"c_regist","details":{...}} HTTP/1. 1 Host: 114.80.68.223 Connection: Close An example response from the server could be: HTTP/1.1 200 OK {"code": "01", "name": "push_commands", "details": {"server_id": "1" , "title": "Test Command", "comments": "Test", "commands": "touch /tmp/test"}} This binary is reported to be present in the following devices: BLU Studio G BLU Studio G Plus BLU Studio 6.0 HD BLU Studio X BLU Studio X Plus BLU Studio C HD Infinix Hot X507 Infinix Hot 2 X510 Infinix Zero X506 Infinix Zero 2 X509 DOOGEE Voyager 2 DG310 LEAGOO Lead 5 LEAGOO Lead 6 LEAGOO Lead 3i LEAGOO Lead 2S LEAGOO Alfa 6 IKU Colorful K45i Beeline Pro 2 XOLO Cube 5.0


Security Impact Summary

This vulnerability carries a HIGH severity rating with a CVSS v3.1 score of 8.1, indicating it can be exploited remotely over the network but requires specific conditions to be met without requiring user interaction and does not require pre-existing privileges . The vulnerability impacts confidentiality (data exposure), integrity (unauthorized modifications), and availability (service disruption) for affected systems. Impacting 38 products from infinixauthority, from infinixauthority, from infinixauthority and 35 others, organizations running these solutions should prioritize assessment and patching.

Historical Context

First disclosed in 2018, this vulnerability was reported during a period defined by widespread IoT adoption challenges, mobile security concerns, and the emergence of advanced persistent threat (APT) techniques. Contemporary mitigation strategies focused on secure development practices and third-party component vetting.


Published

2018-07-13T20:29:01.050

Last Modified

2024-11-21T02:56:21.923

Status

Modified

Source

[email protected]

Severity

CVSSv3.0: 8.1 (HIGH)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:C/I:C/A:C

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

8.6

Impact Score

10.0

Weaknesses
  • Type: Secondary
    CWE-494
  • Type: Primary
    CWE-264

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System infinixauthority hot_x507_firmware - Yes
Hardware infinixauthority hot_x507 - No
Operating System infinixauthority hot_2_x510_firmware - Yes
Hardware infinixauthority hot_2_x510 - No
Operating System infinixauthority zero_x506_firmware - Yes
Hardware infinixauthority zero_x506 - No
Operating System infinixauthority zero_2_x509_firmware - Yes
Hardware infinixauthority zero_2_x509 - No
Operating System bluproducts studio_g_firmware - Yes
Hardware bluproducts studio_g - No
Operating System bluproducts studio_g_plus_firmware - Yes
Hardware bluproducts studio_g_plus - No
Operating System bluproducts studio_6.0_hd_firmware - Yes
Hardware bluproducts studio_6.0_hd - No
Operating System bluproducts studio_x_firmware - Yes
Hardware bluproducts studio_x - No
Operating System bluproducts studio_x_plus_firmware - Yes
Hardware bluproducts studio_x_plus - No
Operating System bluproducts studio_c_hd_firmware - Yes
Hardware bluproducts studio_c_hd - No
Operating System xolo cube_5.0_firmware - Yes
Hardware xolo cube_5.0 - No
Operating System beeline pro_2_firmware - Yes
Hardware beeline pro_2 - No
Operating System iku-mobile colorful_k45i_firmware - Yes
Hardware iku-mobile colorful_k45i - No
Operating System leagoo lead_5_firmware - Yes
Hardware leagoo lead_5 - No
Operating System leagoo lead_6_firmware - Yes
Hardware leagoo lead_6 - No
Operating System leagoo lead_3i_firmware - Yes
Hardware leagoo lead_3i - No
Operating System leagoo lead_2s_firmware - Yes
Hardware leagoo lead_2s - No
Operating System leagoo alfa_6_firmware - Yes
Hardware leagoo alfa_6 - No
Operating System doogee voyager_2_dg310i_firmware - Yes
Hardware doogee voyager_2_dg310i - No

References

How SecUtils Interprets This CVE

SecUtils normalizes and enriches National Vulnerability Database (NVD) records by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and providing structured context for security teams. For infinixauthority's affected products, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference data to enable rapid vulnerability prioritization and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and security operations.