A vulnerability was detected in Mihomo Party up to 1.8.1 on macOS. Affected is the function enableSysProxy of the file src/main/sys/sysproxy.ts of the component Socket Handler. The manipulation results in creation of temporary file with insecure permissions. The attack requires a local approach. This attack is characterized by high complexity. The exploitability is told to be difficult. The exploit is now public and may be used.
https://vuldb.com/?submit.634656
https://vuldb.com/?ctiid.321343
https://github.com/SwayZGl1tZyyy/n-days/blob/main/mihomo-party/README.md#proof-of-concept-1
https://github.com/SwayZGl1tZyyy/n-days/blob/main/mihomo-party/README.md
Published: 2025-08-26
Updated: 2025-08-26
Base Score: 3.5
Vector: CVSS2#AV:L/AC:H/Au:S/C:P/I:P/A:P
Severity: Low
Base Score: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
Severity: Medium
Base Score: 1.1
Vector: CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
Severity: Low