


Perceptive Security
SOC/SIEM Consultancy

Memu Play 7.1.3 contains an insecure folder permissions vulnerability that allows low-privileged users to modify the MemuService.exe executable. Attackers can r…
Published:
4 februari 2026 om 23:00:00
Alert date:
5 februari 2026 om 21:07:15
Source:
nvd.nist.gov
Mobile & IoT, Operating Systems
CVE-2020-37129 affects Memu Play 7.1.3, an Android emulator application. The vulnerability stems from insecure folder permissions that allow low-privileged users to modify the MemuService.exe executable file. Attackers can exploit this weakness by replacing the legitimate service executable with a malicious file. When the system restarts, the malicious executable runs with SYSTEM-level privileges, allowing complete system compromise. This represents a classic privilege escalation attack vector through improper file permissions. The vulnerability has been publicly documented with proof-of-concept exploits available.
Technical details
Mitigation steps:
Affected products:
Memu Play
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2020-37129
https://www.exploit-db.com/exploits/48283
https://www.memuplay.com/
https://www.vulncheck.com/advisories/memu-play-insecure-folder-permissions
Related CVE's:
Related threat actors:
IOC's:
MemuService.exe
This article was created with the assistance of AI technology by Perceptive.
