Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Bitcoin price target $ 116,000 matches the major liquidity wall

    August 4, 2025

    5 of my favorite Linux System – Monitoring Tools – and why I use them

    August 4, 2025

    The best shows like ‘Wednesday’ you should watch ahead

    August 4, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Lovense Sex Toy App Dosha Leaks Private User Email Address
    Security

    Lovense Sex Toy App Dosha Leaks Private User Email Address

    PineapplesUpdateBy PineapplesUpdateJuly 29, 2025No Comments6 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Lovense Sex Toy App Dosha Leaks Private User Email Address
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Lovense Sex Toy App Dosha Leaks Private User Email Address

    Connected Sex Toy Platform Lovence is unsafe for a zero-day defect that allows an attacker to reach an email address of a member, just knowing their user names, putting them at risk of doxing and harassment.

    Lovense is an interactive sex toy manufacturer, known for the creation of app-controlled sex toys with names such as succulent, gush, and perhaps most adventurous, cracked. The company claims that there are 20 million customers worldwide.

    While lovence toys are usually used for both local and long distance entertainment, they are also popular among the CAM models that allow audiences to tip or subscribe to their toys remote controls.

    However, connected experiences can also highlight their lovence user name, and due to this defect, possibly reveal their personal email address.

    Lovense user names are often shared publicly on forums and social media, making them easy goals for the attackers.

    The defect was discovered by the safety researcher Bobdahekar, who collaborated with researchers Eva and Reben to reverse the app and automatic the attack.

    Researchers revealed two flaws four months ago, on 26 March 2025. However, only one flaws, an important account kidnapping defect, was later fixed.

    The lovence falls

    The vulnerability stems from the interaction between the XMPP chat system of the lavens, which is used for communication and backnd of platforms between users.

    “So all this started when I was using the Lavage app and was muteing someone. This is just a matter. Just made them muted,” Bobdaaacker report,

    “But then I saw the API response and was so … Wait, do you know an email? Why is it so? After a deep digging, I came to know how to convert any user name to their email address.”

    To take advantage of the defect, an attacker requests a post request /api/wear/genGtoken The API & Point with their credentials, which gives a GTOKEN (certification token) and AES-CBC encryption key.

    The attacker then takes any publicly known Lavens user name and encryps it using recovered encryption keys. It is sent to encrypted payload /app/ajaxCheckEmailOrUserIdRegisted?email={encrypted_username} API Closing Point.

    The server reacts with data with a fake email address, which the researcher converted into a fake Jabber ID (JID) used by the XMPP server of Lovense.

    By adding this fake Jid to their XMPP contact list and sending an appearance membership on the XMPP (similar to the friend request), the attacker can refresh the roster (contact list), in which both fake jid and real are now connected to the target account.

    However, the problem is that the actual Jid is produced using the user’s actual email, user name in the format !!! Ddomain.com_w@im.lovense.com, allows the attackers to remove the victim’s email address.

    For example, if it returned to Blapping !!

    Researchers confirmed that the entire process could be completed in less than a second time per user with a script. Bleepingcomputer today created a fake account and shared our user name with bobdahacker, allowing them to only connect them as a friend and return the email registered by us.

    The researcher also said that it is not necessary to accept friend requests to take advantage of the defect.

    Bleepingcomputer also confirmed that finding valid user names on Forms and Lovense-related sites is relatively easy, such as lovenselife.com.

    Researchers also claim that fanberry extensions created by Lavens can be used for harvesting of user names as many CAM models use the same user name, making it possible to harvest emails on a large scale.

    Researchers also discovered an important vulnerability that allows them to abduct an account completely.

    Using only an email address, an attacker can generate authentication tokens without the need for a password. Using these tokens, an attacker can apply a user on the levenous platform, including the Lavage connect, streammaster and the CAM101.

    These tokens also allegedly worked on administrator accounts.

    While Lavens has reduced the defect by rejecting the tokens on its API, researchers said that Gtokens could still be generated without a password.

    Both issues were reported to Lavens on 26 March 2025. In April, after submitting bugs on Hacaron, Lavens informed the researchers that the email issue was already known and decided into an upcoming version.

    The company initially reduced the kidnapping defect, but after stating that this full administrator could allow account access, Lovense considered it important.

    Overall, researchers received $ 3,000 for disclosure of flaws.

    On 4 June, the company claimed that the blames were fixed, but the researchers confirmed that the matter was not there. Lovense finally fixed the account kidnapping blame in July, but said it would take about 14 months to resolve the email defect, as it would break the compatibility with their old versions of the app.

    “We have launched a long -term therapeutic plan, which will take about ten months, at least four and the month will need to apply a complete solution completely,” Lavens told the researcher.

    “We have also evaluated a fast, a month’s fix. However, it will need to be forced to upgrade all users immediately, which will disrupt support for heritage versions. We have decided in favor of a more stable and user friendly solution against this approach.”

    Researchers criticized this response, repeatedly claiming the company that the issues were fixed when they were not.

    Bodahekar wrote in the report, “Your users are better eligible. Stop supporting the old app on security. Really fix things. And test your fix before saying this.”

    Finally, Lavens says that he deployed a proxy feature on July 3, which was suggested by the researchers to reduce the attack. However, even after updating a force of the app, the blame was not fixed, so it was not clear what had changed.

    In 2016, Multiple Lovence Falls Email addresses or attackers allowed to determine whether there was an accoun in Lovense at an email address.

    Bleepingcomputer arrived for Lovense for comment, but no response was found.


    Knowledgeable

    CISOS knows how to purchase a board begins with a clear, strategic approach how the cloud safety runs the business price.

    This helps to introduce the risk, impact and priorities to the free, editable board report deck deck security leaders in clear business terms. Convert security updates into meaningful conversations and take fast decision in boardroom.

    address app Dosha email leaks Lovense private Sex toy user
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleBillionaire Ray Dalo supported 15% allocation to Bitcoin and Gold between US loan spiral
    Next Article See first on iPhone 17 Pro? These public pictures confirm large design and camera upgrade
    PineapplesUpdate
    • Website

    Related Posts

    Security

    Gemini adds powerful new deep think models – what it does and who can try it

    August 4, 2025
    Security

    CTM360 Spot malicious ‘clicktok’ campaign targets Tiktok Shop users

    August 4, 2025
    Security

    How to infiltrate Linux system without leaving a trace

    August 4, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    Bitcoin price target $ 116,000 matches the major liquidity wall

    August 4, 2025

    5 of my favorite Linux System – Monitoring Tools – and why I use them

    August 4, 2025

    The best shows like ‘Wednesday’ you should watch ahead

    August 4, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.