
CVE-2022-39075
https://notcve.org/view.php?id=CVE-2022-39075
30 May 2023 — There is an unauthorized access vulnerability in some ZTE mobile phones. If a malicious application is installed on the phone, it could delete some system files without user permission. • https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1030664 •

CVE-2022-39071
https://notcve.org/view.php?id=CVE-2022-39071
30 May 2023 — There is an unauthorized access vulnerability in some ZTE mobile phones. If a malicious application is installed on the phone, it could overwrite some system configuration files and user installers without user permission. • https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1030664 •

CVE-2022-39074
https://notcve.org/view.php?id=CVE-2022-39074
30 May 2023 — There is an unauthorized access vulnerability in some ZTE mobile phones. If a malicious application is installed on the phone, it could start a non-public interface of an application without user permission. • https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1030664 •