A cybersecurity researcher has recognized crucial vulnerabilities in an app developed by intercourse toy producer Lovense that not solely uncovered the non-public electronic mail addresses of customers but in addition enabled risk actors to hijack a consumer’s account on the platform.
The nameless researcher revealed their findings concerning the two in-app safety flaws on Monday, July 28, utilizing the deal with BobDaHacker. Anybody who has created an account on the Lovense app could have been doubtlessly affected as a result of two bugs.
“We might have simply harvested emails from any public username listing. This was particularly dangerous for cam fashions who share their usernames publicly however clearly don’t need their private emails uncovered,” BobDaHacker wrote of their weblog submit. “Cam fashions use these instruments for work, so this was an enormous deal. Actually anybody might take over any account simply by figuring out the e-mail tackle,” they added.
Lovense is taken into account to be one of many largest manufacturers that promote IoT-based intercourse toys. It has over 20 million customers. In 2023, the Singapore-headquartered firm introduced it was the primary to combine OpenAI’s ChatGPT into its merchandise, in keeping with a report by JHB.
The lately found safety vulnerabilities underscore the dangers that include utilizing IoT-based intercourse toys, together with privateness violations and machine lock-ins. It comes lower than every week after Tea, an app that lets ladies anonymously remark and evaluate dates with males, stated it suffered a knowledge breach, with hackers having access to 72,000 consumer pictures.
How has Lovense responded?
BobDaHacker, the researcher, stated that they first introduced the safety flaws to Lovense’s discover on March 26 this yr and gained a $3,000 reward by way of a bug bounty programme.
The researcher stated that he determined to publish their findings within the public area after Lovense reportedly requested 14 months to repair the issues as they didn’t need to power clients utilizing older fashions of intercourse toys to replace their apps instantly.
Story continues beneath this ad
“The e-mail disclosure vulnerability was surprisingly simple when you understood the circulate […] The entire course of took perhaps 30 seconds per username manually, with the script we made although to automate it, it took lower than 1 second for a username to be transformed to an electronic mail,” BobDaHacker wrote.
The corporate has since stated that it has totally addressed the account takeover bug. Lovense is additional anticipated to roll out a software program patch for the e-mail disclosure bug in an replace that might be “pushed to all customers inside the subsequent week”, as per JHB.

