Wednesday, July 30, 2025
HomeTechnologyLovense intercourse toy app flaw leaks personal person electronic mail addresses

Lovense intercourse toy app flaw leaks personal person electronic mail addresses

Lovense intercourse toy app flaw leaks personal person electronic mail addresses

The related intercourse toy platform Lovense is susceptible to a zero-day flaw that enables an attacker to get entry to a member’s electronic mail tackle just by realizing their username, placing them liable to doxxing and harassment.

Lovense is an interactive intercourse toy producer, greatest identified for producing app-controlled intercourse toys with names just like the Lush, the Gush, and, maybe most boldly, the Kraken. The corporate claims to have 20 million prospects worldwide.

Whereas Lovense toys are generally used for each native and long-distance leisure, they’re additionally widespread amongst cam fashions who enable viewers to tip or subscribe for distant management of their toys.

Nonetheless, the related expertise also can expose their Lovense username, and on account of this flaw, doubtlessly reveal their personal electronic mail tackle.

Lovense usernames are sometimes publicly shared on boards and social media, making them straightforward targets for attackers.

The flaw was found by safety researcher BobDaHacker, who collaborated with researchers Eva and Rebane to reverse engineer the app and automate the assault.

The researchers disclosed two flaws over 4 months in the past, on March 26, 2025. Nonetheless, solely one of many flaws, a vital account hijacking flaw, was subsequently fastened.

The Lovense flaws

The vulnerability stems from the interplay between Lovense’s XMPP chat system, used for communication between customers, and the platform’s backend.

“So it began once I was utilizing the Lovense app and muted somebody. That is it. Simply muted them,” explains BobDaHacker’s report.

“However then I noticed the API response and was like… wait, is that an electronic mail tackle? Why is that there? After digging deeper, I found out the way to flip any username into their electronic mail tackle.”

To use the flaw, an attacker makes a POST request to the /api/put on/genGtoken API endpoint with their credentials, which returns a gtoken (authentication token) and AES-CBC encryption keys.

The attacker then takes any publicly identified Lovense username and encrypts it utilizing the retrieved encryption keys. This encrypted payload is shipped to the /app/ajaxCheckEmailOrUserIdRegisted?electronic mail={encrypted_username} API endpoint.

The server responds with knowledge containing a pretend electronic mail tackle, which the researcher transformed right into a pretend Jabber ID (JID) utilized by Lovense’s XMPP server.

By including this pretend JID to their XMPP contact listing and sending a presence subscription over XMPP (much like a buddy request), the attacker can refresh the roster (contact listing), which now consists of each the pretend JID and the actual one related to the goal’s account. 

Nonetheless, the issue is that the actual JID is constructed utilizing the person’s precise electronic mail, within the format username!!!area.com_w@im.lovense.com, permitting attackers to extract the sufferer’s electronic mail tackle.

For instance, if it returned bleeping!!!instance.com_w@im.lovense.com, the ensuing precise electronic mail of the Lovense account is bleeping@instance.com.

The researchers confirmed that your entire course of could be accomplished in lower than one second per person with a script. BleepingComputer created a pretend account at this time and shared our username with BobDaHacker, permitting them to easily join as a buddy and return the e-mail we registered with.

The researcher additionally acknowledged that it is not vital to simply accept a buddy request to use the flaw.

BleepingComputer additionally confirmed that it’s comparatively straightforward to search out legit usernames on boards and Lovense-related websites, like lovenselife.com.

The researcher additionally claims that the FanBerry extension, created by Lovense, can be utilized to reap usernames as most of the cam fashions use the identical username, making wide-scale electronic mail harvesting doable.

The researchers additionally found a vital vulnerability that allow them fully hijack an account.

Utilizing solely an electronic mail tackle, an attacker might generate authentication tokens without having a password. Utilizing these tokens, an attacker might impersonate a person on Lovense platforms, together with Lovense Join, StreamMaster, and Cam101.

These tokens reportedly labored on admin accounts as nicely.

Whereas Lovense has mitigated this flaw by rejecting the tokens on its APIs, the researchers famous that gtokens can nonetheless be generated with no password.

Each points had been reported to Lovense on March 26, 2025. In April, after additionally submitting the bugs on HackerOne, Lovense knowledgeable the researchers that the e-mail subject was already identified and glued in an upcoming model.

The corporate initially downplayed the account hijacking flaw, however after being informed it might enable full admin account entry, Lovense reclassified it as vital.

In whole, the researchers acquired $3,000 for the disclosure of the failings.

On June 4, the corporate claimed the failings had been fastened, however the researchers confirmed this was not the case. Lovense in the end fastened the account hijack flaw in July however acknowledged that it will take roughly 14 months to resolve the e-mail flaw, as it will break compatibility with older variations of their app.

“We have launched a long-term remediation plan that may take roughly ten months, with a minimum of 4 extra months required to completely implement an entire resolution,” Lovense informed the researcher.

“We additionally evaluated a sooner, one-month repair. Nonetheless, it will require forcing all customers to improve instantly, which might disrupt assist for legacy variations. We have determined towards this strategy in favor of a extra steady and user-friendly resolution.”

The researchers criticized this response, stating the corporate repeatedly claimed the problems had been fastened once they weren’t.

“Your customers deserve higher. Cease placing previous app assist over safety. Truly make things better. And check your fixes earlier than saying they work,” BobDaHacker wrote within the report.

In the end, Lovense says they deployed a proxy function on July third that was urged by the researchers to mitigate the assault. Nonetheless, even after doing a pressure replace of the app, the flaw was not fastened, so its unclear what was modified.

In 2016, a number of Lovense flaws uncovered electronic mail addresses or allowed attackers to find out if an electronic mail tackle had an accoune at Lovense.

BleepingComputer reached out to Lovense for remark however didn’t obtain a response.

CISOs know that getting board buy-in begins with a transparent, strategic view of how cloud safety drives enterprise worth.

This free, editable board report deck helps safety leaders current threat, influence, and priorities in clear enterprise phrases. Flip safety updates into significant conversations and sooner decision-making within the boardroom.

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments