CVE-2025-57197
Description
In the Payeer Android application 2.5.0, an improper access control vulnerability exists in the authentication flow for the PIN change feature. A local attacker with root access to the device can dynamically instrument the app to bypass the current PIN verification check and directly modify the authentication PIN. This allows unauthorized users to change PIN without knowing the original/current PIN.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A root-level attacker can bypass PIN verification in the Payeer Android app (2.5.0) by instrumenting the PIN change flow, allowing direct PIN modification without knowing the current PIN.
The Payeer Android application version 2.5.0 contains an improper access control vulnerability in the authentication flow for the PIN change feature. The application fails to enforce a server-side or properly sandboxed verification of the current PIN before allowing a new PIN to be set. Instead, the PIN verification check can be bypassed through local instrumentation.
Exploitation requires an attacker to have root access on the device. With root privileges, the attacker can dynamically instrument the running Payeer application — for example, using tools such as Frida or similar — to intercept and skip the function that verifies the current PIN. The proof-of-concept materials demonstrate that the verification step can be bypassed, allowing the attacker to directly modify the authentication PIN to a value of their choosing.
The impact is that an unauthorized local attacker who gains root access can change the application's authentication PIN without knowing the original PIN. This could lead to unauthorized access to the victim's Payeer wallet and associated funds, as the PIN is the primary authentication mechanism for transactions and app access.
According to the advisory and reproducible steps provided in the research materials, no patch has been announced for this vulnerability at the time of writing. Users are advised to keep their devices free of malware and root access, and to monitor the vendor for an updated version that addresses the improper access control flaw [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: = 2.5.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.