Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    How to turn a USB flash drive into a portable games console

    Don’t buy a PCIe 5.0 SSD unless you say ‘Yes’ to these 3 questions

    Windows Recall is too risky for your PC. I can’t recommend it

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Blue-collar jobs are gaining popularity as AI threatens office work

      August 17, 2025

      Man who asked ChatGPT about cutting out salt from his diet was hospitalized with hallucinations

      August 15, 2025

      What happens when chatbots shape your reality? Concerns are growing online

      August 14, 2025

      Scientists want to prevent AI from going rogue by teaching it to be bad first

      August 8, 2025

      AI models may be accidentally (and secretly) learning each other’s bad behaviors

      July 30, 2025
    • Business

      Why Certified VMware Pros Are Driving the Future of IT

      August 24, 2025

      Murky Panda hackers exploit cloud trust to hack downstream customers

      August 23, 2025

      The rise of sovereign clouds: no data portability, no party

      August 20, 2025

      Israel is reportedly storing millions of Palestinian phone calls on Microsoft servers

      August 6, 2025

      AI site Perplexity uses “stealth tactics” to flout no-crawl edicts, Cloudflare says

      August 5, 2025
    • Crypto

      Chainlink (LINK) Price Uptrend Likely To Reverse as Charts Hint at Exhaustion

      August 31, 2025

      What to Expect From Solana in September

      August 31, 2025

      Bitcoin Risks Deeper Drop Toward $100,000 Amid Whale Rotation Into Ethereum

      August 31, 2025

      3 Altcoins Smart Money Are Buying During Market Pullback

      August 31, 2025

      Solana ETFs Move Closer to Approval as SEC Reviews Amended Filings

      August 31, 2025
    • Technology

      How to turn a USB flash drive into a portable games console

      August 31, 2025

      Don’t buy a PCIe 5.0 SSD unless you say ‘Yes’ to these 3 questions

      August 31, 2025

      Windows Recall is too risky for your PC. I can’t recommend it

      August 31, 2025

      Alienware’s 1440p ultrawide OLED gaming monitor is a huge 50% off

      August 31, 2025

      Clearance! This Asus OLED laptop with 16GB RAM is only $570

      August 31, 2025
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Lovense sex toy app flaw leaks private user email addresses
    Technology

    Lovense sex toy app flaw leaks private user email addresses

    TechAiVerseBy TechAiVerseJuly 29, 2025No Comments7 Mins Read2 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Lovense sex toy app flaw leaks private user email addresses
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    BMI Calculator – Check your Body Mass Index for free!

    Lovense sex toy app flaw leaks private user email addresses

    The connected sex toy platform Lovense is vulnerable to a zero-day flaw that allows an attacker to get access to a member’s email address simply by knowing their username, putting them at risk of doxxing and harassment.

    Lovense is an interactive sex toy manufacturer, best known for producing app-controlled sex toys with names like the Lush, the Gush, and, perhaps most boldly, the Kraken. The company claims to have 20 million customers worldwide.

    While Lovense toys are commonly used for both local and long-distance entertainment, they are also popular among cam models who allow viewers to tip or subscribe for remote control of their toys.

    However, the connected experience can also expose their Lovense username, and due to this flaw, potentially reveal their private email address.

    Lovense usernames are often publicly shared on forums and social media, making them easy targets for attackers.

    The flaw was discovered by security researcher BobDaHacker, who collaborated with researchers Eva and Rebane to reverse engineer the app and automate the attack.

    The researchers disclosed two flaws over four months ago, on March 26, 2025. However, only one of the flaws, a critical account hijacking flaw, was subsequently fixed.

    The Lovense flaws

    The vulnerability stems from the interaction between Lovense’s XMPP chat system, used for communication between users, and the platform’s backend.

    “So it all started when I was using the Lovense app and muted someone. That’s it. Just muted them,” explains BobDaHacker’s report.

    “But then I saw the API response and was like… wait, is that an email address? Why is that there? After digging deeper, I figured out how to turn any username into their email address.”

    To exploit the flaw, an attacker makes a POST request to the /api/wear/genGtoken API endpoint with their credentials, which returns a gtoken (authentication token) and AES-CBC encryption keys.

    The attacker then takes any publicly known Lovense username and encrypts it using the retrieved encryption keys. This encrypted payload is sent to the /app/ajaxCheckEmailOrUserIdRegisted?email={encrypted_username} API endpoint.

    The server responds with data containing a fake email address, which the researcher converted into a fake Jabber ID (JID) used by Lovense’s XMPP server.

    By adding this fake JID to their XMPP contact list and sending a presence subscription over XMPP (similar to a friend request), the attacker can refresh the roster (contact list), which now includes both the fake JID and the real one associated with the target’s account. 

    However, the problem is that the real JID is constructed using the user’s actual email, in the format username!!!domain.com_w@im.lovense.com, allowing attackers to extract the victim’s email address.

    For example, if it returned bleeping!!!example.com_w@im.lovense.com, the resulting actual email of the Lovense account is bleeping@example.com.

    The researchers confirmed that the entire process can be completed in less than one second per user with a script. BleepingComputer created a fake account today and shared our username with BobDaHacker, allowing them to simply connect as a friend and return the email we registered with.

    The researcher also stated that it’s not necessary to accept a friend request to exploit the flaw.

    BleepingComputer also confirmed that it is relatively easy to find legitimate usernames on forums and Lovense-related sites, like lovenselife.com.

    The researcher also claims that the FanBerry extension, created by Lovense, can be used to harvest usernames as many of the cam models use the same username, making wide-scale email harvesting possible.

    The researchers also discovered a critical vulnerability that let them completely hijack an account.

    Using only an email address, an attacker could generate authentication tokens without needing a password. Using these tokens, an attacker could impersonate a user on Lovense platforms, including Lovense Connect, StreamMaster, and Cam101.

    These tokens reportedly worked on admin accounts as well.

    While Lovense has mitigated this flaw by rejecting the tokens on its APIs, the researchers noted that gtokens can still be generated without a password.

    Both issues were reported to Lovense on March 26, 2025. In April, after also submitting the bugs on HackerOne, Lovense informed the researchers that the email issue was already known and fixed in an upcoming version.

    The company initially downplayed the account hijacking flaw, but after being told it could allow full admin account access, Lovense reclassified it as critical.

    In total, the researchers received $3,000 for the disclosure of the flaws.

    On June 4, the company claimed the flaws were fixed, but the researchers confirmed this was not the case. Lovense ultimately fixed the account hijack flaw in July but stated that it would take approximately 14 months to resolve the email flaw, as it would break compatibility with older versions of their app.

    “We’ve launched a long-term remediation plan that will take approximately ten months, with at least four more months required to fully implement a complete solution,” Lovense told the researcher.

    “We also evaluated a faster, one-month fix. However, it would require forcing all users to upgrade immediately, which would disrupt support for legacy versions. We’ve decided against this approach in favor of a more stable and user-friendly solution.”

    The researchers criticized this response, stating the company repeatedly claimed the issues were fixed when they were not.

    “Your users deserve better. Stop putting old app support over security. Actually fix things. And test your fixes before saying they work,” BobDaHacker wrote in the report.

    Ultimately, Lovense says they deployed a proxy feature on July 3rd that was suggested by the researchers to mitigate the attack. However, even after doing a force update of the app, the flaw was not fixed, so its unclear what was changed.

    In 2016, multiple Lovense flaws exposed email addresses or allowed attackers to determine if an email address had an account at Lovense.

    After the publishing of this story, BobDaHacker was told that other researchers named @Krissy and @SkeletalDemise discovered the same account takeover bug in 2023, which was disclosed through HackerOne.

    However, Lovense allegedly marked the flaw as fixed when it was not, changing the severity from high to medium, and only paying out a $350 bug bounty for the disclosure.

    The researchers also found another API, /api/getUserNameByEmailV2, that allowed you to convert a username to an email address or vice-versa, without having to utilize XMPP.

    This API was allegedly patched and stopped working after the disclosure, without alerting the researcher.

    Update 7/29/25 10:51 AM ET: In a statement to BleepingComputer, Lovense thanked BobDaHacker for disclosing the flaws and said that a fix is rolling out in the app stores.

    “We are pleased to inform you that the update addressing the latest vulnerabilities, as referenced by the researcher in his/her blog post last night, was already submitted to app stores before the post was published,” Lovense told BleepingComputer.

    “The full update is expected to be pushed to all users within the next week. Once all users have updated to the new version and we disable older versions, this issue will be completely resolved.”

    However, the spokesperson also stated that the flaw that exposed email addresses was fixed at the end of June. This statement conflicts with how the researcher demonstrated to BleepingComputer yesterday that they could retrieve our email address for our test account simply by accepting their friend request.

    BleepingComputer sent follow-up questions to Lovense about the flaw still working and will update our story with any reply.

    The Board Report Deck CISOs Actually Use

    CISOs know that getting board buy-in starts with a clear, strategic view of how cloud security drives business value.

    This free, editable board report deck helps security leaders present risk, impact, and priorities in clear business terms. Turn security updates into meaningful conversations and faster decision-making in the boardroom.

    BMI Calculator – Check your Body Mass Index for free!

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleGoogle’s AI Mode update adds even more tools for students
    Next Article How attackers are still phishing “phishing-resistant” authentication
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    How to turn a USB flash drive into a portable games console

    August 31, 2025

    Don’t buy a PCIe 5.0 SSD unless you say ‘Yes’ to these 3 questions

    August 31, 2025

    Windows Recall is too risky for your PC. I can’t recommend it

    August 31, 2025
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025168 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 202548 Views

    New Akira ransomware decryptor cracks encryptions keys using GPUs

    March 16, 202530 Views

    Is Libby Compatible With Kobo E-Readers?

    March 31, 202528 Views
    Don't Miss
    Technology August 31, 2025

    How to turn a USB flash drive into a portable games console

    How to turn a USB flash drive into a portable games console Image: Chris Hoffman…

    Don’t buy a PCIe 5.0 SSD unless you say ‘Yes’ to these 3 questions

    Windows Recall is too risky for your PC. I can’t recommend it

    Alienware’s 1440p ultrawide OLED gaming monitor is a huge 50% off

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    How to turn a USB flash drive into a portable games console

    August 31, 20252 Views

    Don’t buy a PCIe 5.0 SSD unless you say ‘Yes’ to these 3 questions

    August 31, 20250 Views

    Windows Recall is too risky for your PC. I can’t recommend it

    August 31, 20252 Views
    Most Popular

    Xiaomi 15 Ultra Officially Launched in China, Malaysia launch to follow after global event

    March 12, 20250 Views

    Apple thinks people won’t use MagSafe on iPhone 16e

    March 12, 20250 Views

    French Apex Legends voice cast refuses contracts over “unacceptable” AI clause

    March 12, 20250 Views
    © 2025 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.