A vulnerability was detected in Mihomo Party up to 1.8.1 on macOS. Affected is the function enableSysProxy of the file src/main/sys/sysproxy.ts of the component Socket Handler. The manipulation results in creation of temporary file with insecure permissions. The attack requires a local approach. This attack is characterized by high complexity. The exploitability is told to be difficult. The exploit is now public and may be used.
Metrics
Affected Vendors & Products
References
History
Tue, 26 Aug 2025 05:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was detected in Mihomo Party up to 1.8.1 on macOS. Affected is the function enableSysProxy of the file src/main/sys/sysproxy.ts of the component Socket Handler. The manipulation results in creation of temporary file with insecure permissions. The attack requires a local approach. This attack is characterized by high complexity. The exploitability is told to be difficult. The exploit is now public and may be used. | |
Title | Mihomo Party Socket sysproxy.ts enableSysProxy temp file | |
Weaknesses | CWE-377 CWE-378 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published: 2025-08-26T05:02:09.404Z
Updated: 2025-08-26T05:02:09.404Z
Reserved: 2025-08-25T15:08:19.362Z
Link: CVE-2025-9474

No data.

Status : Awaiting Analysis
Published: 2025-08-26T05:15:33.173
Modified: 2025-08-26T13:41:58.950
Link: CVE-2025-9474

No data.