
Redazione RHC : 15 November 2025 12:38
Researchers have discovered several critical vulnerabilities in Uhale digital picture frames running Android , with some models even downloading and executing malware during startup. They examined the Uhale app and discovered activity associated with two malware families: Mezmess and Vo1d.
As early as May 2025, researchers attempted to report the issues they encountered to the Chinese company ZEASN (now renamed Whale TV), which is responsible for the Uhale platform used in digital photo frames from many brands. However, the specialists never received a response from the developers.

Experts found that many of the analyzed digital picture frame models download malicious payloads from Chinese servers immediately after being turned on. Upon startup, the devices check for an update to the Uhale app, install the update to version 4.2.0, and reboot. After the reboot, the updated app begins downloading and running the malware.
The downloaded JAR/DEX file is saved to the Uhale application directory and executed on each subsequent system startup. It is not yet clear why version 4.2.0 of the application became malicious (whether this was done intentionally by the developers themselves or whether the ZEASN update infrastructure was compromised).
The detected malware has been linked to the Vo1d botnet , which comprises millions of devices, as well as the Mzmess malware family. This connection is confirmed by packet prefixes, string names, endpoints, the malware distribution process, and a number of artifacts.
In addition to the automatic download of malware (which did not occur on all frames analyzed), researchers also discovered numerous vulnerabilities. In their report, Quokka specialists detailed 17 issues, 11 of which have already been assigned CVE identifiers. The most serious are:
Researchers also found a hardcoded AES key to decrypt sdkbin responses. Additionally, several photo frame models contained Adups update components and outdated libraries , and the app used weak cryptographic schemes and hardcoded keys.
However, it’s difficult to estimate the exact number of victims: most vulnerable photo frames are sold under different brands and without mentioning the Uhale platform. Therefore, researchers cite differing statistics: the Uhale app has been downloaded over 500,000 times on Google Play and has over 11,000 reviews on the App Store. Additionally, Uhale photo frames sold on Amazon have approximately 1,000 reviews .
In conclusion, experts recommend purchasing gadgets only from trusted manufacturers that use official Android images without firmware modifications, support Google services, and have built-in anti-malware protection.
Redazione