ClickCease Xiaomi and WPS Vulnerabilities: File Overwrite Risks Alert

Content Table

Join Our Popular Newsletter

Join 4,500+ Linux & Open Source Professionals!

2x a month. No spam.

Xiaomi and WPS Vulnerabilities: File Overwrite Risks Alert

Wajahat Raja

May 16, 2024 - TuxCare expert team

In the digital realm, security is paramount, especially when it comes to the applications we use daily. Recently, concerns have surfaced regarding vulnerabilities in popular Android applications available on the Google Play Store. Revelations by the Microsoft Threat Intelligence team have unearthed a WPS Office exploit dubbed the Dirty Stream attack, casting a spotlight on potential risks faced by users of certain widely used apps. These Xiaomi and WPS vulnerabilities, intertwined with path traversal intricacies, pose a threat of file overwriting, potentially opening the door to malicious exploitation. 

Let’s have a look at the intricacies of these Xiaomi and WPS vulnerabilities and explore the measures taken to address them.


The Dirty Stream Attack: Understanding Xiaomi and WPS Vulnerabilities

Dimitrios Valsamaras, from the Microsoft Threat Intelligence team, underscores the gravity of the situation. He warns that this vulnerability pattern could lead to dire consequences, from arbitrary code execution to token theft. In essence, the
Xiaomi data breach grants malevolent actors the power to seize control of an application, utilizing pilfered tokens to gain unauthorized access to sensitive user data and online accounts.

Vulnerable Apps

Reports claim that among the numerous apps susceptible to this Xiaomi File Manager vulnerability, two stand out prominently:


  1. Xiaomi File Manager (com.mi. Android.globalFileexplorer) – boasting over 1 billion installations.
  2. WPS Office (cn.wps.moffice_eng) – a staple with over 500 million installations.


Despite Android’s built-in isolation mechanisms, vulnerabilities in these apps have surfaced, shedding light on potential shortcomings in the platform’s security architecture.


Content Provider Flaws

Android’s content provider, designed to facilitate secure data sharing between apps, inadvertently becomes the Achilles’ heel in this scenario. While intended to provide a secure conduit for file exchange, flaws in implementation allow for bypassing read/write restrictions within an app’s home directory. Valsamaras underscores the importance of rigorous validation in this process, emphasizing the need for meticulous scrutiny to thwart potential exploits.

Exploiting Trust: The Role of Content Providers

The mechanism of exploitation hinges on the blind trust exhibited by the consuming app towards incoming data. By leveraging a custom, explicit intent, malicious actors can inject arbitrary payloads disguised within innocuous filenames, effectively hoodwinking the unsuspecting app into executing rogue code. This breach of trust can have far-reaching consequences, from the clandestine exfiltration of sensitive information to the execution of malicious code.

Consequences Of The Dirty Stream Vulnerability Android

The ramifications of this
Xiaomi and WPS vulnerabilities extend beyond mere data compromise. By overwriting critical files within the target app’s private data space, attackers can manipulate app behavior, potentially compromising user privacy and security. This Android file overwrite exploit underscores the urgent need for robust security measures to safeguard against such exploits.

Mitigating the Risk: Rectification Efforts by Xiaomi and WPS Office

In response to responsible disclosure, both Xiaomi and WPS Office have taken proactive measures to address the vulnerability, implementing fixes as of February 2024. However, the pervasiveness of such
Android security vulnerabilities necessitates a broader call to action within the developer community. Microsoft advocates for thorough app audits to identify and rectify similar issues, ensuring the integrity and security of Android ecosystems.

Industry Response: Google’s Guidance on Secure Filename Handling

Acknowledging the gravity of the situation, Google has issued guidance to developers, emphasizing the importance of secure filename handling. By urging developers to generate unique filenames internally rather than relying on potentially compromised inputs from server applications, Google aims to fortify the resilience of Android apps against exploitation. For comprehensive
mobile data protection, Android security measures need to be implemented.


The vulnerabilities unearthed in Xiaomi File Manager and WPS Office serve as a stark reminder of the ever-present threats lurking within the Android ecosystem. As users entrust their sensitive data to these applications, it becomes imperative for developers to prioritize security and resilience in their software. 

Through collective vigilance and concerted efforts, we can fortify the defenses of Android applications, ensuring a safer and more secure digital landscape for all. To enhance security, patch Xiaomi File Manager with the latest updates as well as update WPS Office.

The sources for this piece include articles in The Hacker News and Tech Radar.

Xiaomi and WPS Vulnerabilities: File Overwrite Risks Alert
Article Name
Xiaomi and WPS Vulnerabilities: File Overwrite Risks Alert
Uncover the latest on Xiaomi and WPS vulnerabilities. Learn how file overwrites risks put your data at stake. Stay informed for secure usage!
Publisher Name
Publisher Logo

Looking to automate vulnerability patching without kernel reboots, system downtime, or scheduled maintenance windows?

Learn About Live Patching with TuxCare

Become a TuxCare Guest Writer

Get started




Linux & Open Source

Subscribe to
our newsletter