Required CVE Record Information
Description
There is an unauthorized access vulnerability in some ZTE mobile phones. If a malicious application is installed on the phone, it could start a non-public interface of an application without user permission.
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.