Description

In the Android application air.SmartLog.android version 2.6.8, a hidden Developer Mode is protected by a hardcoded local password. An attacker can discover this logic through reverse engineering and enable internal/debug functionality without any server-side authentication or role-based access control. Once enabled, additional internal features become accessible, including a debug calculator entry, hidden personal/debug settings, and conditional sync-entry exposure bypass. This may lead to unauthorized access to internal functionality, local configuration tampering, and amplified data integrity and privacy risks.

Step To Reproduce

1、Decompile the APK using jadx

2、Locate the hidden Developer Mode logic and hardcoded password in air/SmartLog/android/SummaryFragment.java

image.png

3、Run the app, open the Summary page, and rapidly tap the logo multiple times (trigger path in hiddenMenuTimer).

4、Enter 123ewq in the dialog.

5、Observe that Developer Mode is enabled.

Video Proof of Concept

554179cf89bd413c8de35a97b5ce3717[00h00m00s-00h00m11s].gif

Mitigation

Impact

An attacker can reverse engineer the app, extract the hardcoded password, and unlock internal features intended for restricted/debug use. This weakens access control boundaries, may enable unauthorized configuration changes, increases the attack surface, and can contribute to data integrity/privacy and compliance risk.

References