Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-30284

CVE-2026-30284: UXGROUP Voice Recorder RCE Vulnerability

CVE-2026-30284 is an arbitrary file overwrite flaw in UXGROUP Voice Recorder v10.0 that enables remote code execution. Attackers exploit the file import process to overwrite critical files and execute code.

Published: April 2, 2026

CVE-2026-30284 Overview

An arbitrary file overwrite vulnerability has been identified in UXGROUP LLC Voice Recorder v10.0. This vulnerability allows attackers to overwrite critical internal files via the file import process, which can lead to arbitrary code execution or information exposure. The flaw is classified under CWE-73 (External Control of File Name or Path), indicating that the application improperly handles user-controlled file paths during the import functionality.

Critical Impact

Successful exploitation allows attackers to overwrite critical system files, potentially leading to arbitrary code execution or sensitive information exposure on affected devices.

Affected Products

  • UXGROUP LLC Voice Recorder v10.0
  • Voice Recorder application with vulnerable file import functionality
  • Android/iOS devices running the affected Voice Recorder version

Discovery Timeline

  • 2026-03-31 - CVE-2026-30284 published to NVD
  • 2026-04-01 - Last updated in NVD database

Technical Details for CVE-2026-30284

Vulnerability Analysis

The vulnerability resides in the file import process of the Voice Recorder application. When a user imports audio files or related data, the application fails to properly validate and sanitize file paths provided as input. This allows an attacker to craft malicious input that escapes the intended directory structure and overwrites arbitrary files within the application's sandbox or accessible storage locations.

The local attack vector requires user interaction—specifically, the victim must import a maliciously crafted file. However, the scope is changed (S:C in the CVSS vector), meaning the vulnerable component impacts resources beyond its security scope, affecting the confidentiality and integrity of other system components.

Root Cause

The root cause of this vulnerability is CWE-73: External Control of File Name or Path. The application accepts external input to construct file paths without adequate validation or sanitization. This allows path traversal sequences (such as ../) or absolute paths to be injected, enabling writes to locations outside the intended import directory.

The application's file handling routines do not implement proper canonicalization or bounds checking before writing imported data to disk, creating an opportunity for attackers to manipulate the destination path.

Attack Vector

The attack requires local access and user interaction. An attacker must convince a victim to import a specially crafted file into the Voice Recorder application. The malicious file contains path manipulation sequences that exploit the vulnerable import functionality.

When the victim imports the malicious file, the application processes the embedded path without validation, resulting in critical internal files being overwritten. Depending on the target files, this can lead to code execution (by overwriting executable files or configuration that references executables) or information disclosure (by overwriting files that control data access or logging).

The vulnerability mechanism can be understood as follows: the import handler reads the destination filename from user-controlled input, constructs a file path by concatenating the application's data directory with the user-supplied filename, and writes the imported content to that location. Without proper path validation, directory traversal sequences allow escape from the intended directory, enabling arbitrary file overwrites within the application's permissions scope.

Detection Methods for CVE-2026-30284

Indicators of Compromise

  • Unexpected modifications to application configuration files within the Voice Recorder data directory
  • Presence of audio files or application data in non-standard locations
  • Application crashes or unexpected behavior following file import operations
  • Modified timestamps on critical application files that don't correlate with legitimate updates

Detection Strategies

  • Monitor file system activity for write operations outside the Voice Recorder application's expected directories during import operations
  • Implement file integrity monitoring for critical application files and system configurations
  • Review application logs for failed or suspicious file import attempts with unusual path patterns
  • Configure endpoint detection rules to alert on path traversal patterns in file operations

Monitoring Recommendations

  • Enable enhanced logging for file system operations on mobile devices running the vulnerable application
  • Monitor for anomalous application behavior patterns that may indicate successful exploitation
  • Implement application-level sandboxing to detect and prevent unauthorized file access attempts

How to Mitigate CVE-2026-30284

Immediate Actions Required

  • Remove or disable the UXGROUP LLC Voice Recorder v10.0 application until a patched version is available
  • Avoid importing files from untrusted sources into the Voice Recorder application
  • Review any recently imported files and check for unexpected changes to system or application files
  • Consider using alternative voice recording applications that implement proper input validation

Patch Information

As of the last NVD update on 2026-04-01, no official vendor patch has been announced. Users should monitor the vendor's official channels and the GitHub Issue #25 for updates regarding security fixes. Additional information may be available through AppCraze or SecSys Fudan University who documented this vulnerability.

Workarounds

  • Disable or restrict the file import functionality within the application if possible
  • Only import files from verified and trusted sources
  • Implement device-level file access controls to limit the application's write permissions
  • Use mobile device management (MDM) solutions to restrict application capabilities on enterprise devices
bash
# Android ADB command to restrict app permissions (if applicable)
adb shell pm revoke com.uxgroup.voicerecorder android.permission.WRITE_EXTERNAL_STORAGE
adb shell pm revoke com.uxgroup.voicerecorder android.permission.MANAGE_EXTERNAL_STORAGE

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechUxgroup Voice Recorder

  • SeverityHIGH

  • CVSS Score8.6

  • EPSS Probability0.01%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityHigh
  • AvailabilityHigh
  • CWE References
  • CWE-73
  • Technical References
  • Voice.com Homepage

  • AppCraze Website

  • GitHub Issue #25

  • SecSys Fudan University
  • Latest CVEs
  • CVE-2025-49454: TinySalt Path Traversal Vulnerability

  • CVE-2025-48261: MultiVendorX Information Disclosure Flaw

  • CVE-2025-32119: CardGate WooCommerce SQL Injection Flaw

  • CVE-2025-26879: s2Member Plugin Reflected XSS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English