VYPR
Medium severity4.3NVD Advisory· Published Feb 27, 2025· Updated Apr 15, 2026

CVE-2024-9285

CVE-2024-9285

Description

A vulnerability was found in Tu Yafeng Via Browser up to 5.9.0 on Android. It has been rated as problematic. This issue affects some unknown processing of the component Javascript Bridge. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A cross-site scripting (XSS) vulnerability exists in the Javascript Bridge component of Via Browser up to 5.9.0 on Android, allowing remote attacks.

Vulnerability

Overview

The vulnerability resides in the Javascript Bridge component of Via Browser for Android (versions up to 5.9.0). The exact processing flaw leads to improper handling of user-controlled input, enabling cross-site scripting (XSS) attacks. The issue is classified as problematic with a CVSS v3 score of 4.3 (Medium). [1]

Exploitation

An attacker can trigger the vulnerability remotely, without requiring prior authentication or user interaction beyond normal browser usage. The attack vector involves manipulating the Javascript Bridge to inject and execute arbitrary JavaScript code within the browser context. The exploit has been publicly disclosed, increasing the risk of practical attacks. [1]

Impact

Successful exploitation could allow an attacker to execute arbitrary scripts in the context of the browser, potentially leading to data theft, session hijacking, or other client-side attacks. The vulnerability may also be chained with other bugs—as demonstrated in a related advisory—to achieve more severe outcomes such as remote code execution with ASLR bypass. [1]

Mitigation

A patch is recommended by the vendor to fix the issue. Users should update Via Browser to a patched version as soon as possible. No workarounds have been published. The vulnerability has been publicly disclosed with a proof of concept, so applying the patch is urgent. [1]

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.