The vulnerability stems from a lack of proper input validation and authentication within the Lookout application's Missing Device feature. Specifically, the application trusts location data received from external sources (e.g., a GPS spoofer) without verifying its authenticity or integrity. This allows an attacker to inject arbitrary GPS coordinates, overriding the device's actual location. The root cause is a failure to implement secure communication protocols and data validation, leading to a trust-based vulnerability where the application blindly accepts external data.