hulkvision’s Blog

馃憢 HI! I’M SUNNY 馃憢WELCOME!

Android Notification DoS: When a GIF Crashes Your Phone (CVE-2025-48631 Incomplete Fix)

Intro In December 2025 I decided to try something different, a long pending goal of mine I wanted to start looking at the Android OS itself. I figured the best way to get started was to go through the Android Security Bulletin and study the types of issues being reported and fixed by the Android security team. I went through the December 2025 bulletin and one vulnerability stood out to me, CVE-2025-48631, a critical Denial-of-Service in the notification image decoding pipeline. The fix included a sample malformed GIF which made it very easy to test. What started as a simple reproduction exercise turned into discovering that the fix was incomplete, and that the vulnerability was still triggering on the latest patched version of Android. ...

May 9, 2026 路 9 min 路 Sunny Gupta

Exploiting JavaScript Interface for Unauthorized Access in a 'global' cryptocurrency exchange android app

Intro Webview in Android Ecosystem is an extension of Android鈥檚 view class that lets you display web pages as a part of your application activity layout. You can call it as a web browser built into your application but it doesn鈥檛 include the features of a fully developed web browser, such as navigation controls or an address bar. It is one of the widely used component in android application ecosystem, it is also prone to number of potential errors. If it is possible to load arbitrary url or execute arbitrary javascript in webview it could potentially lead to leaking of authentication tokens, the theft of arbitrary files and access to arbitrary activities. In this blog I will show how I exploited the exposed javascript interface by the application to perform critical authenticated actions like placing a trade order, cancelling trade order or deactivting the account. ...

September 4, 2024 路 8 min 路 Sunny Gupta

RCE in Adobe Acrobat Reader for android(CVE-2021-40724)

# Summary While testing Adobe Acrobat reader app , the app has a feature which allows user to open pdfs directly from http/https url. This feature was vulnerable to path traversal vulnerability. Abode reader was also using Google play core library for dynamic code loading. using path traversal bug and dynamic code loading,i was able to acheive remote code execution. # Finding Path traversal vulnerability <activity android:theme="@style/Theme_Virgo_SplashScreen" android:name="com.adobe.reader.AdobeReader" android:exported="true" android:launchMode="singleTask" android:screenOrientation="user" android:configChanges="keyboardHidden|screenLayout|screenSize|smallestScreenSize" android:noHistory="false" android:resizeableActivity="true"> <intent-filter> <action android:name="android.intent.action.VIEW"/> <action android:name="android.intent.action.EDIT"/> <category android:name="android.intent.category.DEFAULT"/> <category android:name="android.intent.category.BROWSABLE"/> <data android:scheme="file"/> <data android:scheme="content"/> <data android:scheme="http"/> <data android:scheme="https"/> <data android:mimeType="application/pdf"/> </intent-filter> There is this intent-filter in the app which shows it will accept http/https url scheme and mimeType should be application/pdf for this actiivity. ...

January 14, 2022 路 5 min 路 Sunny Gupta