CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Uhale Android-based photo frames deliver malware on boot

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

Uhale Android-based digital picture frames have been found to download and execute malware on boot due to multiple critical security vulnerabilities. The issues were reported to the manufacturer, ZEASN (now Whale TV), but went unaddressed. The malware is linked to the Mezmess and Voi1d families. The devices also have multiple security gaps, including disabled SELinux, rooted systems, and use of AOSP test-keys. The vulnerabilities allow for remote code execution, command injection, and unauthorized file access. The exact number of affected users is unknown due to the devices being sold under various brands.

Timeline

  1. 13.11.2025 15:00 1 articles · 23h ago

    Uhale photo frames download malware on boot

    Uhale Android-based digital picture frames have been found to download and execute malware on boot due to multiple critical security vulnerabilities. The issues were reported to the manufacturer, ZEASN (now Whale TV), but went unaddressed. The malware is linked to the Mezmess and Voi1d families. The devices also have multiple security gaps, including disabled SELinux, rooted systems, and use of AOSP test-keys. The vulnerabilities allow for remote code execution, command injection, and unauthorized file access. The exact number of affected users is unknown due to the devices being sold under various brands.

    Show sources

Information Snippets