

All you have to do is set up a connection between two devices before getting started. You also don’t require any cables or USB devices to make file sharing possible. Moreover, it doesn’t rely on any local sharing alternatives already present.Īs a cloud-based sharing provider, SHAREit download makes transferring files simple even if you don’t have an internet connection. It works to transfer files without bothering users with complicated configurations or protocols. SHAREit is an easy-to-use software that makes sharing files from one device to another, simple and hassle-free. Moreover, the program offers a high-speed connection, far greater than what you would get if you were using Bluetooth to send files. With the help of the tool, you can easily send files to another device without needing an internet connection or Bluetooth device. In the past, vulnerabilities that can be used to download and steal files from users' devices have also been associated with the app," he said in a statement late on Monday.SHAREit is a free file-sharing application that is now available for download on Windows devices. "They can also potentially lead to Remote Code Execution (RCE). The vulnerabilities can be abused to leak a user's sensitive data and execute arbitrary code with SHAREit permissions by using a malicious code or app," said Echo Duan, a security researcher with Trend Micro. "We discovered several vulnerabilities in the application named SHAREit. 'ShareIt Lite, Bigo Lite, Helo Lite, VFY Lite': Lighter Versions of Banned Chinese Mobile Apps Removed from Google Play Store and Apple App Store. Now banned in India, SHAREit was one of the most downloaded applications in 2019, which means millions of Indian users may also be at data leaking risk. The bugs can be exploited to run malicious code on smartphones where the SHAREit app is installed, according to a new report by cyber security firm Trend Micro. New Delhi: A bug in Android file sharing app SHAREit which has been downloaded over 1 billion times in Google Play Store contains several unpatched vulnerabilities that can be abused by hackers to leak sensitive data of its users.
