How a Wormhole‑Style Vulnerability in 360 Browser Enables Remote Code Execution on Android

Security researchers discovered a wormhole‑style flaw in the popular 360 Browser for Android that allows remote code execution through a custom HTTP service, affecting both rooted and non‑rooted devices, and a patch (version 6.9.9.71) was released on November 23 to mitigate the issue.

ITPUB
ITPUB
ITPUB
How a Wormhole‑Style Vulnerability in 360 Browser Enables Remote Code Execution on Android

360 Browser is a widely used PC and mobile browser in China, with over 460 million downloads across 360, Tencent, and Wandoujia markets. It is known for emphasizing user device security.

Twenty‑four hours ago the WuYun vulnerability platform reported a new bug in 360 Browser. Subsequent detailed analysis of the 360 Secure Browser (package com.qihoo.expressbrowser) uncovered a severe “wormhole” vulnerability.

The flaw resembles the Wormhole/DimensionDoor exploits: a specially crafted HTTP service can be triggered to open a back‑door. Even after applying an app‑level patch, the HTTP service remains active; the only way to stop it is to manually pause the service in system settings or reboot the device.

To remediate the issue, Qihoo released a test build 6.9.9.71 on November 23. Versions released before that date, such as 6.9.9.70, are vulnerable. Users who have not updated past November 23 should upgrade to 6.9.9.71 or later and restart their phones.

The vulnerability enables remote code execution on any Android phone with 360 Browser installed. On rooted devices, an attacker can fully control the phone—install arbitrary APKs, read emails and SMS, and manipulate the camera and microphone. On non‑rooted devices, the attacker can share the browser’s permissions to send/receive SMS, read call logs, access browsing history, and control the camera and microphone.

As of November 23, most users had not yet upgraded to the latest version. This blog post was published to alert users promptly; a detailed analysis report and the exploit code will be released in a follow‑up post.

A proof‑of‑concept video demonstrates the vulnerability on a rooted phone, where a remote trigger replaces a legitimate banking app with an arbitrary application.

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

Androidinformation securityVulnerabilityRemote Code Execution360 BrowserWormhole
ITPUB
Written by

ITPUB

Official ITPUB account sharing technical insights, community news, and exciting events.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.