Vivo Z5x

From Wiki-IoT


Classification

Vivo Z5x
Classification
Grade B
Calculator version 1
Classification date 2025-10-09
Information
Name Vivo Z5x 5G Smart Phone
Brand by Parent Vivo by Vivo
Generation Z5x Series (Part of Vivo Z Series)
Model(s) V1911A, V1911T (Main models for Chinese market; regional variants exist)
Release date 2019-05-01
Type/Category 5G Smart Phone
Website [1]
Status End of sale
More
Dimensions Approximately 162.39 mm (L) × 77.33 mm (W) × 8.85 mm (H)
Mass Approximately 193 g
Operating system Pre-installed Funtouch OS 9.1 (Based on Android 9 Pie)
Companion App Vivo Service, Vivo Official Website, Funtouch OS Security Center
CPU Qualcomm Snapdragon 712 (2×Cortex-A75 2.3GHz + 6×Cortex-A55 1.7GHz, Samsung 10nm LPP process)
GPU Qualcomm Adreno 616
Memory 4GB / 6GB / 8GB LPDDR4X (Dual-channel, non-expandable)
Storage 128GB UFS 2.1 (Non-expandable; supports microSD card expansion up to 256GB)
Battery 5000mAh (Typical capacity) lithium polymer battery
Power 18W fast charger (Input: 100-240V ~ 50/60Hz; Output: 9V/2A)
Charging Supports 18W wired fast charging (vivo FlashCharge); no wireless charging
Display 6.53-inch LCD full-view screen, 2340×1080 (FHD+) resolution, 60Hz refresh rate, 400 nits typical brightness, 16.7 million colors, DC dimming support
Camera - Rear: 16MP main camera (Samsung S5K3P9, f/1.79 aperture, PDAF) + 8MP ultra-wide-angle camera (f/2.2 aperture, 120° field of view) + 2MP depth camera (f/2.4 aperture) - Front: 16MP selfie camera (Samsung S5K3P9, f/2.0 aperture)
Sound Single bottom-firing speaker, Hi-Res Audio certification, built-in microphone
Connectivity - Network: 5G NR, Wi-Fi 5 (802.11ac), Bluetooth 5.0 - Others: NFC (partial models), Infrared remote control - Ports: USB Type-C (2.0), 3.5mm headphone jack
Device
Criterion Value Proof(s) Comment
Known hardware tampering Rare [2] The device features a highly integrated hardware design; disassembly requires professional tools and voids the warranty. Ordinary users have high tampering difficulty, and public hardware tampering cases are extremely rare.
Known vulnerabilities Rare [3] During its support period, Vivo released updates to fix hardware-related vulnerabilities. Due to the model’s age, new vulnerabilities are rarely reported, and public high-risk hardware vulnerability records are scarce.
Prior attacks None [No public authoritative links] There are no reports of large-scale hardware-targeted attacks on the Vivo Z5x. Most security incidents involving the model are software-level (e.g., app vulnerabilities) and unrelated to hardware.
Updatability Very common [4] As a 2019-released model, Vivo has stopped providing major system version updates and regular security patches. Only critical emergency fixes (if any) may be issued, resulting in low updatability.
Category score 2
System
Criterion Value Proof(s) Comment
Authentication with other systems Partial [5] Supports linkage authentication and data synchronization with other vivo devices via Vivo Account. Lacks full cross-platform authentication capabilities outside the vivo ecosystem.
Communications Encrypted with up-to-date encryption [6] Wi-Fi supports WPA3 encryption; Bluetooth 5.0 adopts AES-CCM encryption; 5G communication complies with 3GPP-standard AES encryption, all meeting current security standards.
Storage Encrypted with up-to-date encryption [7] Funtouch OS 9.1 (based on Android 9) enables File-based Encryption (FBE) by default, using the AES-256 algorithm, which is consistent with up-to-date storage encryption standards.
Category score 2
User Authentication
Criterion Value Proof(s) Comment
Account management Full [8] Supports comprehensive management of local accounts and Vivo accounts, including creation, deletion, permission assignment (administrator/standard user), and account password recovery.
Authentication Secure [9] Supports multiple secure authentication methods: password, PIN, side-mounted fingerprint recognition (capacitive), and 2D face recognition.
Brute-force protection Exist [10] The system automatically locks the device for a period (e.g., 30 seconds) after 5 consecutive incorrect authentication attempts, effectively resisting brute-force attacks.
Event logging Access event logged [11] Key access events (e.g., successful login, authentication failure, device lock) are recorded in the system log, which can be viewed via developer mode or professional tools.
Passwords Require change after setup [12] Initial password/PIN setup is mandatory during first boot, but there is no built-in mandatory regular password change requirement. Users can manually set password complexity rules.
Category score 2
Grade B