Home

Description

EN DE

A vulnerability was found in Ooma Office Business Phone App up to 7.2.2 on Android. This affects an unknown part of the component com.ooma.office2. The manipulation results in improper export of android application components. The attack needs to be approached locally. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

Es wurde eine Schwachstelle in Ooma Office Business Phone App bis 7.2.2 auf Android entdeckt. Das betrifft eine unbekannte Funktionalität der Komponente com.ooma.office2. Die Bearbeitung verursacht improper export of android application components. Umgesetzt werden muss der Angriff lokal. Die Ausnutzung wurde veröffentlicht und kann verwendet werden.

PUBLISHED Reserved 2025-09-19 | Published 2025-09-19 | Updated 2025-09-19 | Assigner VulDB




MEDIUM: 4.8CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
MEDIUM: 5.3CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
MEDIUM: 5.3CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
4.3AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR

Problem types

Improper Export of Android Application Components

Product status

7.2.0
affected

7.2.1
affected

7.2.2
affected

Timeline

2025-09-19:Advisory disclosed
2025-09-19:VulDB entry created
2025-09-19:VulDB entry last update

Credits

fxizenta (VulDB User) reporter

References

vuldb.com/?id.325009 (VDB-325009 | Ooma Office Business Phone App com.ooma.office2 improper export of android application components) vdb-entry

vuldb.com/?ctiid.325009 (VDB-325009 | CTI Indicators (IOB, IOC)) signature permissions-required

vuldb.com/?submit.645012 (Submit #645012 | Ooma Ooma Office 7.2.2 Task Hijacking) third-party-advisory

github.com/KMov-g/androidapps/blob/main/com.ooma.office2.md exploit

cve.org (CVE-2025-10718)

nvd.nist.gov (CVE-2025-10718)

Download JSON