CVE-2026-30290
Received Received - Intake
Arbitrary File Overwrite in InTouch Contacts App Enables Code Execution

Publication date: 2026-03-31

Last updated on: 2026-04-07

Assigner: MITRE

Description
An arbitrary file overwrite vulnerability in InTouch Contacts & Caller ID APP v6.38.1 allows attackers to overwrite critical internal files via the file import process, leading to arbitrary code execution or information exposure.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-31
Last Modified
2026-04-07
Generated
2026-05-07
AI Q&A
2026-03-31
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
intouchapp intouch_contacts_&_caller_id 6.38.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-30290 is an arbitrary file overwrite vulnerability in the InTouch Contacts & Caller ID app version 6.38.1. It occurs due to insufficient security validation during the file import process, which allows an attacker to manipulate the filename and content of imported files.

By exploiting path traversal techniques, an attacker can overwrite critical internal files within the app’s storage, including executable and configuration files.

This can lead to arbitrary code execution or exposure of sensitive information.


How can this vulnerability impact me? :

This vulnerability can have several severe impacts including:

  • Arbitrary code execution, allowing attackers to run malicious code within the app.
  • Exposure of sensitive information stored within the app.
  • Denial of service or app malfunction, potentially causing the app to fail to launch or operate correctly.
  • Privilege escalation, enabling attackers to gain higher access rights.

The attack requires minimal user interaction and can be triggered automatically when the victim opens a malicious app.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves arbitrary file overwrite via the file import process in InTouch Contacts & Caller ID app v6.38.1, exploiting path traversal to overwrite critical internal files.

Detection can focus on monitoring the app's file import activity for suspicious file names or paths that include traversal sequences (e.g., ../) and unexpected modifications to internal executable or configuration files.

Since the vulnerability is triggered by the component `com.intouchapp.activities.ext_share.ExternalShareActivity`, monitoring logs or app behavior related to this component may help detect exploitation attempts.

  • Check for unexpected file changes in the app's storage directories, especially executable and configuration files.
  • Use file integrity monitoring tools to detect unauthorized overwrites.
  • On Android devices, use commands like `adb shell` to inspect app directories and check for suspicious files or modifications.
  • Example commands (assuming Android debugging enabled):
  • `adb shell run-as com.intouchapp ls -l /data/data/com.intouchapp/files/` to list files in app storage.
  • `adb shell run-as com.intouchapp stat /data/data/com.intouchapp/files/<filename>` to check file metadata for suspicious changes.
  • Monitor logs for activity related to `ExternalShareActivity` using `adb logcat | grep ExternalShareActivity`.

What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting or disabling the file import functionality in the InTouch Contacts & Caller ID app version 6.38.1 until a patch or update is available.

Avoid opening or importing files from untrusted sources to prevent exploitation via malicious file imports.

Monitor and restrict app permissions related to file access and external sharing to limit the attack surface.

If possible, update the app to a version where this vulnerability is fixed once available.

Consider using mobile device management (MDM) solutions to control app behavior and enforce security policies.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows attackers to overwrite critical internal files, potentially leading to arbitrary code execution or exposure of sensitive information.

Exposure of sensitive information due to this vulnerability could result in non-compliance with data protection regulations such as GDPR or HIPAA, which mandate the protection of personal and health-related data.

Additionally, arbitrary code execution and privilege escalation could compromise the integrity and confidentiality of data, further impacting compliance with these standards.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart