This vulnerability occurs when an application establishes an outgoing communication channel but fails to correctly define or enforce the intended recipient. This misdirection can allow data to be sent to an untrusted or malicious destination.
Attackers can exploit this flaw in two primary ways. First, if they can directly control the destination specification—such as in Server-Side Request Forgery (SSRF) or by spoofing UDP packets—they can redirect traffic to systems they control. This is often used to bypass firewalls, mask attack origins, or launch denial-of-service attacks. Second, the flaw can stem from the application itself incorrectly specifying the target due to misconfiguration, faulty parsing (like of email addresses or IPs), or insecure mechanisms like Android's sticky broadcasts. This unintentional misdirection can allow a malicious actor to intercept sensitive data meant for a trusted service, effectively spoofing it.
python