<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent comments.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent comments.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 30 Apr 2026 03:48:50 +0000</lastBuildDate>
    <item>
      <title>A vulnerability report for BYD (Chinese car maker)</title>
      <link>https://vulnerability.circl.lu/comment/21f63dda-f998-4c51-b7ce-6efc09015c56</link>
      <description>
# Vulnerability Report - BYD QIN PLUS DM-i - Dilink OS - Incorrect Access Control

**Product:** BYD QIN PLUS DM-i - Dilink OS

**Vendor**: https://www.byd.com/

**Version**:  3.0_13.1.7.2204050.1.

**Vulnerability Type:** Incorrect Access Control

**Attack Vectors**: The user installs and runs an app on the IVI system that only requires normal permissions.

## Introduction

​	The BYD QIN PLUS DM-i with Dilink OS contains an Incorrect Access Control vulnerability. Attackers can bypass permission restrictions and obtain confidential vehicle data through **Attack Path 1**: **System Log Theft** and **Attack Path 2**: **CAN Traffic Hijacking**.

## Attack Path 1 : System Log Theft

​	Incorrect access control in BYD QIN PLUS DM-i Dilink OS  3.0_13.1.7.2204050.1 allows unaithorized attackers to access system  logcat logs.

### Description

​	The DiLink 3.0 system’s /system/bin/app_process64 process logs system logcat data, storing it in zip files in the /sdcard/logs folder. These logs are accessible by regular apps, allowing them to bypass restrictions, escalate privileges, and potentially copy and upload sensitive vehicle data (e.g., location, fuel/energy consumption, VIN, mileage) to an attacker’s server. This poses a serious security risk, as the data is highly confidential for both users and manufacturers.

### Detailed Steps

1. Check the system-collected and stored system logs.

![log.png](https://s2.loli.net/2025/01/26/MRTCqKnv1aEIpQZ.png)

2. The malicious app copies system files to its own private directory. The main code is as follows:

&lt;img src="https://s2.loli.net/2025/01/26/EqxHDSX9O5Ibhr4.png" alt=".png" style="zoom: 50%;" /&gt;

3. The malicious app successfully steals system logs to its private directory.

   ![.png](https://s2.loli.net/2025/01/26/r7vsY93LgTb6coF.png)

4. Extract the file and search for sensitive confidential information in the system logs.

​		(a) Fuel consumption, energy consumption, and seatbelt status.

![111.png](https://s2.loli.net/2025/01/26/6jkmACTRwxaX7sb.png)

​		(b) ICCID, VIN (Vehicle Identification Number), and model code.

![vin.png](https://s2.loli.net/2025/01/26/nJWl3fq5QKVNuEx.png)

​		(c) Diagnostic command format.

![.png](https://s2.loli.net/2025/01/26/jc3xCTkUd8a4ZF2.png)

​		(d) Various detailed vehicle status information.

![.png](https://s2.loli.net/2025/01/26/lSTFK7thceQJ16b.png)

### **Ethical Considerations**

​	The vulnerability has been reported to the manufacturer and confirmed. It has been addressed and fixed in in the latest versions, with the logs now encrypted.

### Additional Notes

​	Our vulnerability discovery was conducted on a standalone in-vehicle system, and due to the absence of a real vehicle, the logs collected by the system were quite limited. In a real vehicle, we expect to collect a much richer and larger volume of logs. Due to device limitations, we were unable to conduct further verification. Additionally, only one version of the in-vehicle system was tested, but other versions may also contain the same vulnerability, with the actual impact potentially being more severe.

### Disclaimer

​	This vulnerability report is intended solely for informational purposes and must not be used for malicious activities. The author disclaims any responsibility for the misuse of the information provided.



## Attack Path 2 : CAN Traffic Hijacking

​	The attacker can remotely intercept the vehicle's CAN traffic, which is supposed to be sent to the manufacturer's cloud server, and potentially use this data to infer the vehicle's status.

### Description

​	In the DiLink 3.0 system, the /system/priv-app/CanDataCollect folder is accessible to regular users, allowing them to extract CanDataCollect.apk and analyze its code. The "com.byd.data_collection_notify" broadcast, not protected by the system, lets apps set the CAN traffic upload URL. This enables attackers to:

1. Set the upload URL to null, preventing cloud data collection.
2. Set the upload URL to an attacker’s domain for remote CAN traffic collection.

​	Additionally, the encoded upload files can be decrypted using reverse-engineered decoding functions, enabling attackers to remotely analyze CAN traffic and infer the vehicle's status.

### Detailed Steps

1. The vulnerability code for the broadcast handling in CanDataCollect.apk.

&lt;img src="https://s2.loli.net/2025/01/26/RanvVwJZYUuq9i8.png" alt=".png" style="zoom:50%;" /&gt;

2. The exploitation code for the malicious app vulnerability.

&lt;img src="https://s2.loli.net/2025/01/26/QBC8cxEkKtuY5XT.png" alt=".png" style="zoom:50%;" /&gt;

3. The malicious app successfully modifies the uploaded CAN traffic URL.

![.png](https://s2.loli.net/2025/01/26/sugvP14iSFrAhHW.png)

4. After the attack on the IVI system, the logcat logs route CAN traffic to the attacker’s server.

&lt;img src="https://s2.loli.net/2025/01/26/2Cxtc3UvFe9X7pn.png" alt=".png" style="zoom: 50%;" /&gt;

5. The CAN traffic collected by the attacker and the decoded results.

&lt;img src="https://s2.loli.net/2025/01/27/YqinPrht6S8CFBW.png" alt=".png" style="zoom:50%;" /&gt;

### **Ethical Considerations**

​	The vulnerability has been reported to the manufacturer and confirmed. It has been addressed and fixed in the latest versions.

### Additional Notes:

​	Our vulnerability discovery was conducted on a standalone in-vehicle system, and due to the absence of a real vehicle, the logs collected by the system were quite limited. In a real vehicle, we expect to collect a much richer and larger volume of logs. Due to device limitations, we were unable to conduct further verification. Additionally, only one version of the in-vehicle system was tested, but other versions may also contain the same vulnerability, with the actual impact potentially being more severe.

### Disclaimer

​	This vulnerability report is intended solely for informational purposes and must not be used for malicious activities. The author disclaims any responsibility for the misuse of the information provided.</description>
      <content:encoded>
# Vulnerability Report - BYD QIN PLUS DM-i - Dilink OS - Incorrect Access Control

**Product:** BYD QIN PLUS DM-i - Dilink OS

**Vendor**: https://www.byd.com/

**Version**:  3.0_13.1.7.2204050.1.

**Vulnerability Type:** Incorrect Access Control

**Attack Vectors**: The user installs and runs an app on the IVI system that only requires normal permissions.

## Introduction

​	The BYD QIN PLUS DM-i with Dilink OS contains an Incorrect Access Control vulnerability. Attackers can bypass permission restrictions and obtain confidential vehicle data through **Attack Path 1**: **System Log Theft** and **Attack Path 2**: **CAN Traffic Hijacking**.

## Attack Path 1 : System Log Theft

​	Incorrect access control in BYD QIN PLUS DM-i Dilink OS  3.0_13.1.7.2204050.1 allows unaithorized attackers to access system  logcat logs.

### Description

​	The DiLink 3.0 system’s /system/bin/app_process64 process logs system logcat data, storing it in zip files in the /sdcard/logs folder. These logs are accessible by regular apps, allowing them to bypass restrictions, escalate privileges, and potentially copy and upload sensitive vehicle data (e.g., location, fuel/energy consumption, VIN, mileage) to an attacker’s server. This poses a serious security risk, as the data is highly confidential for both users and manufacturers.

### Detailed Steps

1. Check the system-collected and stored system logs.

![log.png](https://s2.loli.net/2025/01/26/MRTCqKnv1aEIpQZ.png)

2. The malicious app copies system files to its own private directory. The main code is as follows:

&lt;img src="https://s2.loli.net/2025/01/26/EqxHDSX9O5Ibhr4.png" alt=".png" style="zoom: 50%;" /&gt;

3. The malicious app successfully steals system logs to its private directory.

   ![.png](https://s2.loli.net/2025/01/26/r7vsY93LgTb6coF.png)

4. Extract the file and search for sensitive confidential information in the system logs.

​		(a) Fuel consumption, energy consumption, and seatbelt status.

![111.png](https://s2.loli.net/2025/01/26/6jkmACTRwxaX7sb.png)

​		(b) ICCID, VIN (Vehicle Identification Number), and model code.

![vin.png](https://s2.loli.net/2025/01/26/nJWl3fq5QKVNuEx.png)

​		(c) Diagnostic command format.

![.png](https://s2.loli.net/2025/01/26/jc3xCTkUd8a4ZF2.png)

​		(d) Various detailed vehicle status information.

![.png](https://s2.loli.net/2025/01/26/lSTFK7thceQJ16b.png)

### **Ethical Considerations**

​	The vulnerability has been reported to the manufacturer and confirmed. It has been addressed and fixed in in the latest versions, with the logs now encrypted.

### Additional Notes

​	Our vulnerability discovery was conducted on a standalone in-vehicle system, and due to the absence of a real vehicle, the logs collected by the system were quite limited. In a real vehicle, we expect to collect a much richer and larger volume of logs. Due to device limitations, we were unable to conduct further verification. Additionally, only one version of the in-vehicle system was tested, but other versions may also contain the same vulnerability, with the actual impact potentially being more severe.

### Disclaimer

​	This vulnerability report is intended solely for informational purposes and must not be used for malicious activities. The author disclaims any responsibility for the misuse of the information provided.



## Attack Path 2 : CAN Traffic Hijacking

​	The attacker can remotely intercept the vehicle's CAN traffic, which is supposed to be sent to the manufacturer's cloud server, and potentially use this data to infer the vehicle's status.

### Description

​	In the DiLink 3.0 system, the /system/priv-app/CanDataCollect folder is accessible to regular users, allowing them to extract CanDataCollect.apk and analyze its code. The "com.byd.data_collection_notify" broadcast, not protected by the system, lets apps set the CAN traffic upload URL. This enables attackers to:

1. Set the upload URL to null, preventing cloud data collection.
2. Set the upload URL to an attacker’s domain for remote CAN traffic collection.

​	Additionally, the encoded upload files can be decrypted using reverse-engineered decoding functions, enabling attackers to remotely analyze CAN traffic and infer the vehicle's status.

### Detailed Steps

1. The vulnerability code for the broadcast handling in CanDataCollect.apk.

&lt;img src="https://s2.loli.net/2025/01/26/RanvVwJZYUuq9i8.png" alt=".png" style="zoom:50%;" /&gt;

2. The exploitation code for the malicious app vulnerability.

&lt;img src="https://s2.loli.net/2025/01/26/QBC8cxEkKtuY5XT.png" alt=".png" style="zoom:50%;" /&gt;

3. The malicious app successfully modifies the uploaded CAN traffic URL.

![.png](https://s2.loli.net/2025/01/26/sugvP14iSFrAhHW.png)

4. After the attack on the IVI system, the logcat logs route CAN traffic to the attacker’s server.

&lt;img src="https://s2.loli.net/2025/01/26/2Cxtc3UvFe9X7pn.png" alt=".png" style="zoom: 50%;" /&gt;

5. The CAN traffic collected by the attacker and the decoded results.

&lt;img src="https://s2.loli.net/2025/01/27/YqinPrht6S8CFBW.png" alt=".png" style="zoom:50%;" /&gt;

### **Ethical Considerations**

​	The vulnerability has been reported to the manufacturer and confirmed. It has been addressed and fixed in the latest versions.

### Additional Notes:

​	Our vulnerability discovery was conducted on a standalone in-vehicle system, and due to the absence of a real vehicle, the logs collected by the system were quite limited. In a real vehicle, we expect to collect a much richer and larger volume of logs. Due to device limitations, we were unable to conduct further verification. Additionally, only one version of the in-vehicle system was tested, but other versions may also contain the same vulnerability, with the actual impact potentially being more severe.

### Disclaimer

​	This vulnerability report is intended solely for informational purposes and must not be used for malicious activities. The author disclaims any responsibility for the misuse of the information provided.</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/comment/21f63dda-f998-4c51-b7ce-6efc09015c56</guid>
      <pubDate>Sun, 26 Jan 2025 17:57:50 +0000</pubDate>
    </item>
  </channel>
</rss>
