Mojawa Run Plus

From Wiki-IoT


Classification

Mojawa Run Plus
Classification
Grade C
Calculator version 1
Classification date 2025-10-05
Information
Name MOJAWA Run Plus Bone Conduction Sports Earphones
Brand by Parent Mojawa by MOJAWA (Shenzhen) Technology Co., Ltd.
Generation
Model(s) Run Plus
Release date 2023-03-10
Type/Category Earphone
Website [1]
Status In sale
More
Dimensions
Mass Approx. 33g
Operating system Proprietary Embedded System
Companion App "MOJAWA" Official App
CPU Proprietary Bluetooth Audio SoC
GPU Not Applicable
Memory
Storage 32GB Internal Storage
Battery Lithium-ion, approx. 10-hour battery life
Power Magnetic Charging
Charging Supports fast charging
Display
Camera
Sound Physical Dual Transducer Bone Conduction Drivers
Connectivity Bluetooth 5.3
Device
Criterion Value Proof(s) Comment
Known hardware tampering None [] Risk of hardware tampering is very low for a branded consumer electronic device.
Known vulnerabilities None [] No publicly disclosed specific vulnerabilities for this model. Its simple functionality presents a small attack surface.
Prior attacks None [] No publicly reported attack instances targeting this specific model.
Updatability Rare [] Firmware updates are possible via the "MOJAWA" app, but the update frequency and long-term support policy are unclear.
Category score 2
System
Criterion Value Proof(s) Comment
Authentication with other systems Partial [] Connects to devices using standard Bluetooth pairing protocols.
Communications Encrypted with up-to-date encryption [] Bluetooth 5.3 connections are encrypted by default using modern standards (e.g., AES-CCM).
Storage No encryption [] The 32GB internal storage for music files is most likely not encrypted, as it functions as an MP3 player.
Category score 2
User Authentication
Criterion Value Proof(s) Comment
Account management Basic [] The earphones themselves have no user account system. A companion app may involve basic account management (e.g., registration, device binding).
Authentication Basic [] Physical power on/off. Bluetooth pairing is the primary "authentication" method.
Brute-force protection Absent [] The Bluetooth pairing process itself has no brute-force protection mechanism.
Event logging Absent [] The device itself has no user event logging capability.
Passwords Default/Common/Easy to guess [] Bluetooth pairing typically uses common PINs like "0000" or requires no PIN.
Category score 3
Grade C