The linked intercourse toy platform Lovense is weak to zero-day flaws that permit attackers to entry member e mail addresses just by figuring out their username.
Lovense is greatest recognized for creating app-controlled grownup toys with names like The Lush, The Gush, and maybe probably the most boldest Kraken. The corporate claims it has 20 million prospects worldwide.
Lovense Toys is often used for each native and long-distance leisure, however can also be in style amongst CAM fashions that permit viewers to chip or subscribe to distant controls of toys.
Nonetheless, linked experiences may also publish their Lovense usernames. This defect might lead to your non-public e mail tackle being displayed.
Lovense usernames are sometimes printed on boards and social media, making them simpler to focus on attackers.
The flaw was found by Bobdahacker, a safety researcher who works with researchers EVA and Rebane to reverse engineer apps and automate assaults.
Researchers revealed two defects on March 26, 2025 4 months in the past. Nonetheless, solely one of many important account hijacking flaws has been fastened.
The vulnerability stems from the interplay between Lovense’s XMPP chat system and the platform’s backend, which is used to speak between customers.
“So it began once I muted somebody utilizing the Lovense app. That is it. I simply muted them,” explains Bobdahacker’s report.
“However I noticed the API response and…wait, is it an e mail tackle? Why is it there? After digging deeper, I discovered a method to change the username to their e mail tackle.”
To benefit from the flaw, the attacker /api/put on/genGtoken
The API endpoint has credentials that return a GTOKEN (authentication token) and an AES-CBC encryption key.
The attacker then collects the general public Lovense username and encrypts it utilizing the encrypted key. This encrypted payload shall be despatched to /app/ajaxCheckEmailOrUserIdRegisted?e mail={encrypted_username}
API endpoint.
The server responds with knowledge containing faux e mail addresses that researchers have transformed to faux Jabber ID (JID) utilized by Lovense’s XMPP server.
By including this faux JID to the XMPP contact listing and sending a presence subscription through XMPP, the attacker can replace the roster (contact listing). This contains each the faux JID and the actual one related to the goal account.
Nonetheless, the issue is that Actual JID makes use of the consumer’s precise e mail and the username!!! ! It’s constructed utilizing [email protected] to permit attackers to extract the sufferer’s e mail tackle.
For instance, in case you return bleeping!!!! [email protected], the precise e mail in your Lovense account is [email protected].
Researchers have confirmed that all the course of will be accomplished in lower than a second per consumer utilizing scripts. BeleepingComputer created a faux account as we speak and shared its username with Bobdahacker.
The researchers additionally mentioned there was no want to simply accept requests from pals to take advantage of the issues.
BleepingComputer has confirmed that discovering legit usernames comparatively straightforward on boards like Lovenselife.com and on Lovense-related websites is comparatively straightforward.
Researchers additionally argue that utilizing the FanBerry extension created by Lovense, many CAM fashions use the identical username and can be utilized to reap usernames.
Researchers additionally found a important vulnerability that permits accounts to be hijacked fully.
An attacker can use solely an e mail tackle to generate an authentication token with out the necessity for a password. Utilizing these tokens, attackers can impersonate customers on Lovense platforms similar to Lovense Join, Streammaster, and CAM101.
These tokens reportedly additionally labored in admin accounts.
Lovense mitigated this flaw by rejecting API tokens, however researchers famous that Gtokens can nonetheless be generated with no password.
Each points had been reported by Lovense on March 26, 2025. In April, after submitting a bug with Hackerone, Lovense notified researchers that the e-mail challenge was already recognized and has been fastened in a future model.
The corporate initially downplayed the hijacking flaw in its account, however after being instructed it might grant full administrative account entry, Lovense reclassified it as vital.
In complete, the researchers acquired $3,000 for disclosure of defects.
On June 4, the corporate claimed that the defect had been fastened, however researchers confirmed that this was not the case. Lovense ultimately fastened an account hijacking flaw in July, however mentioned it could take about 14 months to resolve the e-mail flaw because it breaks compatibility with older variations of the app.
“Now we have began a long-term correction plan that takes about 10 months. It takes at the least 4 months to completely implement the whole answer,” Lovense instructed researchers.
“We additionally evaluated the month’s repair sooner, however we have to drive all customers to improve instantly. This disrupts help for legacy variations. We opposed this method and supported a extra secure and simpler to make use of answer.”
Researchers criticized the response, saying the corporate repeatedly claimed that the difficulty was fastened when it was not.
“Your customers deserve higher. Cease placing help for older apps in safety. Be sure you sort things. And check the repair earlier than they are saying they work,” Bobdahacker wrote within the report.
Finally, Lovense says it deployed its proxy function on July third. It says this was proposed by researchers to mitigate the assault. Nonetheless, even after the app’s drive replace, the issues weren’t fastened, so it’s unclear what was modified.
In 2016, a number of Lovense flaws both publish e mail addresses or allow attackers to find out whether or not the e-mail tackle has Accountine in Lovense.
BleepingComputer contacted Lovense for remark however didn’t obtain a response.
Up to date 7/28/25 11:41 PM ET: In response to questions relating to this extra knowledge leak, TEA shared the next assertion:
“As a part of our ongoing investigation into cybersecurity instances involving TEA apps, we’ve got not too long ago discovered that direct message (DM) is accessed as a part of our first incident,” Tea instructed BleepingComputer.
“On account of a wealth of consideration, we took the affected system offline. Presently, we discovered no proof of entry to different elements of the surroundings.”
“That is an ongoing investigation and we’ll attempt to share well timed updates when extra data turns into accessible.”
“Our crew is totally dedicated to enhancing the safety of our tee apps and we sit up for sharing extra about these enhancements quickly. In the meantime, we’re working to determine customers whose private data is concerned and who will present free identification safety providers to these people.”