top of page
perceptive_background_267k.jpg

Memu Play 7.1.3 contains an insecure folder permissions vulnerability that allows low-privileged users to modify the MemuService.exe executable. Attackers can r…

Published:

4 februari 2026 om 23:00:00

Alert date:

5 februari 2026 om 21:07:15

Source:

nvd.nist.gov

Click to open the original link from this advisory

Mobile & IoT, Operating Systems

CVE-2020-37129 affects Memu Play 7.1.3, an Android emulator application. The vulnerability stems from insecure folder permissions that allow low-privileged users to modify the MemuService.exe executable file. Attackers can exploit this weakness by replacing the legitimate service executable with a malicious file. When the system restarts, the malicious executable runs with SYSTEM-level privileges, allowing complete system compromise. This represents a classic privilege escalation attack vector through improper file permissions. The vulnerability has been publicly documented with proof-of-concept exploits available.

Technical details

Mitigation steps:

Affected products:

Memu Play

Related links:

Related CVE's:

Related threat actors:

IOC's:

MemuService.exe

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page