3 security risks from Android motion sensors and how to stay safe
A surprising discovery of the security flaw is the smartphone motion sensor embedded in their hardware.
The ESP32 is an extremely popular low-cost chip from Chinese manufacturer Espressif, which is estimated to be used in over 1 billion devices worldwide by 2023, and contains an undocumented "backdoor" that can be exploited for attacks.
These undocumented commands allow for impersonation of trusted devices, unauthorized access to data, redirection to other devices on the network, and the ability to establish persistence.
The discovery was made public by Spanish cybersecurity researchers Miguel Tarascó Acuña and Antonio Vázquez Blanco from the Tarlogic Security team. Speaking at the RootedCON conference in Madrid, they said:
Tarlogic Security has discovered a backdoor in the ESP32, a family of WiFi and Bluetooth-enabled microcontrollers found in millions of IoT devices on the market. Exploiting this backdoor would allow malicious actors to launch spoofing attacks and permanently infect sensitive devices such as mobile phones, computers, smart locks, or medical devices by bypassing code checks.
The ESP32 is one of the most widely used chips in the world for Wi-Fi + Bluetooth connectivity in IoT (Internet of Things) devices, so the risk of any backdoors existing is huge.
Backdoor in ESP32
In a presentation at RootedCON, Tarlogic researchers explained that interest in Bluetooth security research has declined, but not because the protocol or its implementations have become more secure.
Instead, most of the attacks presented last year had no working tools, were incompatible with mainstream hardware, and used outdated or unmaintained tools that are largely incompatible with modern systems.
Tarlogic has developed a new C-based, hardware-independent and cross-platform USB Bluetooth driver that allows direct access to the hardware without relying on operating system specific APIs.
Armed with this new tool, which allows raw access to Bluetooth traffic, Tarlogic discovered hidden vendor-specific commands (Opcode 0x3F) in the ESP32 Bluetooth firmware, allowing low-level control of Bluetooth functions.
In total, they found 29 undocumented commands, collectively described as a “backdoor,” that can be abused for memory manipulation (read/write RAM and Flash), MAC address spoofing (device spoofing), and LMP/LLCP packet injection. The issue is currently tracked under the identifier CVE-2025-27840.
Potential risks
Risks arising from these commands include malicious deployment at the OEM level and supply chain attacks.
Depending on how the Bluetooth stack handles HCI commands on the device, remote backdoor exploitation may be possible via malicious firmware or a spoofed Bluetooth connection.
This is especially true if the attacker already has root access, installs malware, or pushes a malicious update to the device, opening up low-level access.
However, in general, having physical access to a device's USB or UART interface is much more dangerous and a more realistic attack scenario.
" In a scenario where you can compromise an IoT device running an ESP32 chip, you would be able to hide an APT (Advanced Persistent Threat) in the ESP memory and perform Bluetooth (or Wi-Fi) attacks against other devices, while also controlling the device over Wi-Fi/Bluetooth ," the team explains. " Our discovery would allow full control of the ESP32 chip and maintain persistence in the chip through commands that allow modification of RAM and Flash. Additionally, with persistence in the chip, it would be possible to spread to other devices because ESP32 allows for advanced Bluetooth attacks . "
WebTech360 will continue to update information on this issue, please pay attention.
In the new One UI 3.0 version on Samsung, users can use many other interesting and attractive features, such as reviewing deleted notifications on the Samsung status bar.
What are the best and shortest November 19 wishes for your lover? If you are out of ideas, this article will suggest meaningful November 19 wishes for you.
Basic sweaters are an indispensable part of all of our fall and winter wardrobes. Here are some simple yet fashionable ways to mix and match sweaters.
Having enemies is always an unpleasant situation. Luckily, you can turn your enemies into friends. Here are some simple ways to mend relationships that are available to everyone.
Since Netflix is easily accessible on all devices including phones, tablets, game consoles, and streaming devices, you might be wondering how many people can watch Netflix at the same time on the same account.
Centering cells in Word when working with tables is an operation that needs to be performed to reformat the text in each cell according to regulations, as well as create a Word table with a more beautiful and easy-to-see layout.
Samsung Electronics is reportedly collaborating with OpenAI on an ambitious joint project to develop AI TVs that incorporate industry-leading artificial intelligence technologies.
After a lot of snapshots, additions, and changes, the update is complete and ready for release. The official Minecraft 1.21 release date has just been revealed!
In a stunning display of creativity, 16 humanoid robots from China's leading robotics company Unitree took the spotlight at CCTV's annual Spring Festival Gala.
Why are clothes and towels machine-dried soft and smooth, but when hung to dry they often feel scratchy or rough?
NASA's satellites use an imaging tool called Resolve, which has a sensor of just 36 pixels.
When opening the App Store on iPhone, iPad, Mac to download applications or games, the error Cannot Connect to iTunes Store appears and here is the solution.
VPN (Virtual Private Network) is simply understood as a virtual private network system, capable of creating a network connection based on a certain service provider.
Valentine's Day is a day for couples to express their feelings for each other. You can create Valentine's cards to send to your other half, collage photos to celebrate Valentine's Day, or create videos for Valentine's Day.
If your computer does not meet the minimum requirements to run Hyper Light Breaker, you may experience performance issues or be unable to launch the game.