📌 1. Reporting information


🧩 2. Overview of Vulnerabilities


🔍 3. Details

This attack is carried out through a malicious application installed locally. The attacker exploits a configuration vulnerability in the AndroidManifest.xml of the reolink app to hijack the Task by displaying a crafted malicious Activity instead of the intended one when the user launches the legitimate app.

The key to the attack lies in the MainActivity settings within the AndroidManifest.xml file of the Realink app.

<activity
            android:name="com.android.bc.MainActivity"
            android:exported="true"
            android:launchMode="singleTask"
            android:screenOrientation="portrait"
            android:configChanges="screenSize|orientation|keyboardHidden"
            android:windowSoftInputMode="adjustPan|stateAlwaysHidden">
            <intent-filter>
                <action android:name="android.intent.action.VIEW"/>
                <category android:name="android.intent.category.DEFAULT"/>
                <category android:name="android.intent.category.BROWSABLE"/>
                <data android:scheme="@string/scheme_for_launch_app"/>
            </intent-filter>
        </activity>

The two conditions in the code are combined to create a vulnerability.