### [CVE-2022-0732](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0732) ![](https://img.shields.io/static/v1?label=Product&message=Copy9&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=ExactSpy&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=FoneTracker&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=GuestSpy&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=MxSpy&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SecondClone&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=The%20Truth%20Spy&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=TheSpyApp&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=iSpyoo&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-284%20Improper%20Access%20Control&color=brighgreen) ### Description The backend infrastructure shared by multiple mobile device monitoring services does not adequately authenticate or authorize API requests, creating an IDOR (Insecure Direct Object Reference) vulnerability. ### POC #### Reference - https://techcrunch.com/2022/02/22/stalkerware-network-spilling-data/ - https://techcrunch.com/2022/02/22/stalkerware-network-spilling-data/ #### Github No PoCs found on GitHub currently.