CVE-2025-5346
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-17

Last updated on: 2025-07-17

Assigner: CERT.PL

Description
Bluebird devices contain a pre-loaded barcode scanner application. This application exposes an unsecured broadcast receiver "kr.co.bluebird.android.bbsettings.BootReceiver". A local attacker can call the receiver to overwrite file containing ".json" keyword with default barcode config file. It is possible to overwrite file in any location due to lack of protection against path traversal in name of the file. This issue affects all versions before 1.3.3.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-17
Last Modified
2025-07-17
Generated
2026-05-07
AI Q&A
2025-07-17
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
bluebird barcode_scanner_application *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-926 The Android application exports a component for use by other applications, but does not properly restrict which applications can launch the component or access the data it contains.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in Bluebird devices' pre-loaded barcode scanner application, which exposes an unsecured broadcast receiver named "kr.co.bluebird.android.bbsettings.BootReceiver". A local attacker can invoke this receiver to overwrite files containing the ".json" keyword with the default barcode configuration file. Due to a lack of protection against path traversal in the file name, it is possible to overwrite files in any location on the device.


How can this vulnerability impact me? :

The vulnerability allows a local attacker to overwrite arbitrary files on the device by exploiting the unsecured broadcast receiver and path traversal flaw. This could lead to unauthorized modification of configuration files or other important files, potentially disrupting device functionality or enabling further attacks.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, update the Bluebird barcode scanner application to version 1.3.3 or later, as all versions before 1.3.3 are affected. Additionally, restrict local access to the device to prevent attackers from calling the unsecured broadcast receiver and exploiting the path traversal vulnerability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart