Description
A security flaw has been discovered in Freedom Factory dGEN1 up to 20260221. The impacted element is the function FakeAppService of the component org.ethosmobile.ethoslauncher. The manipulation results in improper authorization. The attack must be initiated from a local position. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-07
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Improper Authorization
Action: Assess Impact
AI Analysis

Impact

A flaw in the FakeAppService function of Freedom Factory dGEN1’s org.ethosmobile.ethoslauncher component leads to improper authorization. The local attacker gains unauthorized access to functionality normally protected, potentially allowing privilege escalation or unauthorized data disclosure. The vulnerability is characterized by the weaknesses identified in CWE-266 (Improper Privilege Allocation) and CWE-285 (Improper Authorization). The exploit code is publicly available and can be used by anyone with local device access.

Affected Systems

Freedom Factory dGEN1 is affected in all releases up to 20260221. No specific sub‑models or firmware revisions beyond that timestamp are listed, so any device running the specified firmware or earlier should be considered vulnerable.

Risk and Exploitability

The CVSS score of 4.8 indicates a moderate risk, while the EPSS score of less than 1% reflects a low probability of exploitation in the wild. The vulnerability is not currently listed in CISA’s KEV catalog. Because the attack vector is local, an adversary must first obtain access to the device, either as a physical user or via another local exploit. Once local access is established, the attacker can invoke the FakeAppService API to bypass authorization checks and gain elevated privileges or access restricted data.

Generated by OpenCVE AI on April 16, 2026 at 10:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Disable or remove the FakeAppService component from the device firmware.
  • Restrict service invocation to trusted user accounts and enforce proper authorization checks.
  • Upgrade the device firmware to a version newer than 20260221 to apply vendor‑issued security patches.

Generated by OpenCVE AI on April 16, 2026 at 10:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Freedom Factory
Freedom Factory dgen1
Vendors & Products Freedom Factory
Freedom Factory dgen1

Sat, 07 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in Freedom Factory dGEN1 up to 20260221. The impacted element is the function FakeAppService of the component org.ethosmobile.ethoslauncher. The manipulation results in improper authorization. The attack must be initiated from a local position. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title Freedom Factory dGEN1 org.ethosmobile.ethoslauncher FakeAppService improper authorization
Weaknesses CWE-266
CWE-285
References
Metrics cvssV2_0

{'score': 4.3, 'vector': 'AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Freedom Factory Dgen1
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-11T16:29:07.087Z

Reserved: 2026-03-06T20:53:00.230Z

Link: CVE-2026-3667

cve-icon Vulnrichment

Updated: 2026-03-11T16:23:12.633Z

cve-icon NVD

Status : Deferred

Published: 2026-03-07T16:15:56.797

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-3667

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T11:00:10Z

Weaknesses