ES File Explorer Update Brings HTTP Vulnerability Fix, Other Bug Fixes

Advertisement
By Tasneem Akolawala | Updated: 21 January 2019 14:20 IST
Highlights
  • ES File Explorer has quickly rolled out a fix for the HTTP vulnerability
  • Reported last week, vulnerability allowed easy phone access to hackers
  • ES File Explorer v4.1.9.9 update with the fix is available on Google Play

ES File Explorer was reported to have HTTP vulnerability in LAN

Just last week, an HTTP vulnerability was reported within ES File Explorer - a popular app used by many to manage phone storage. The vulnerability allegedly gave hackers easy access to phone's files, and all the victim had to do was open the app once to be exposed to it. Developers of ES File Explorer were quick to respond to this newfound bug, and within days of the reported vulnerability, a fix for the same has been issued. The update ES File Explorer v4.1.9.9 version is now available on Google Play, and all users are recommended to download it.

The changelog for the ES File Explorer v4.1.9.9 update states that the HTTP vulnerability in LAN has been fixed, alongside some other known bug fixes as well. The new v4.1.9.9 update also fixes a problem "that the music player part could not create a song list". A spokesperson also confirmed the fixes to Android Police, "The issue of unauthorised copying of files has been fixed by removing the corresponding code. The way a man-in-the-middle attack is avoided by the way the server upgrades."

We recommend all users to update to the latest version of ES File Explorer. The update is available to download for free on the Play Store, and as we mentioned, comes within days of the vulnerability being reported. The company had reportedly issued a fix last week itself, and was waiting for the Google market to pass the review. The developers told Android Police, "We have fixed the http vulnerability issue and released it. Waiting for the Google market to pass the review." And now finally the update with the fix is out for download.

Advertisement

According to security researcher who goes by the pseudonym Eliot Alderson, ES File Explorer used to start an HTTP server on port 59777, which left your phone accessible to anyone on the same local network to exploit it. The attacker can then use that port to inject a JSON payload and list out the files you have and even download them. If you happen to still use the app in in v4.1.9.7.4 and lower, then its best to update immediately, or connect only to highly trusted networks, or look for other alternatives.

 

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

Further reading: ES File Explorer
Advertisement

Related Stories

Popular Mobile Brands
  1. Apple Watch Series 11, Watch SE 3, Watch Ultra 3: Expected Features, Specs
  2. Samsung Galaxy S25 FE Accessories Leaked Ahead of September 4 Launch
  1. Scientists Create Stretchy Rubber That Converts Body Heat Into Electricity for Wearables
  2. NASA’s InSight Reveals Ancient Planetary Remains Preserved Deep Inside Mars
  3. Rajinikanth’s Coolie is Coming to OTT Platforms Soon: Know When, Where to Watch it Online
  4. NASA’s Juno Spacecraft Detects Callisto’s Aurora, Completing Jupiter’s Galilean Moons Set
  5. Kalyani Priyadarshan’s Lokah Chapter 1: Chandra OTT Release Date Revealed
  6. Astronomers Discover Calvera, a Runaway Pulsar Racing Above the Milky Way
  7. Itel A90 Limited Edition Launched in India With MIL-STD-810H Durability: Price, Specifications
  8. OKX Faces EUR 2.25 Million Fine By Dutch National Bank for Operating Without Registration
  9. NASA’s OSIRIS-REx Mission Finds Stardust in Asteroid Bennu Older Than the Solar System
  10. Swiggy and Zomato Raise Platform Fees to Up to Rs. 15 Amidst Rise in Festival-Related Demand
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.