mstdn.io is one of the many independent Mastodon servers you can use to participate in the fediverse.

Administered by:

Server stats:

368
active users

@sjb AFAIU it requires already having root on the chip, so it's not really a backdoor

@wolf480pl @sjb It doesn't strictly require already having root on the device - if the bluetooth implementation generates bluetooth commands in some way, that would allow for easy remote exploitation (if an attacker can get the bluetooth library to generate the backdoor opcodes, the attacker can trivially write to memory or flash and get persistent exploitation).

@Suiseiseki @sjb by remote you mean wirelessly over bluetooth?

@Suiseiseki @sjb AFAIK the bluetooth implementation comes bundled with the sdk for that chip, and people writing software that runs on ESP32 typically use it unmodified. Have the researchers found code in the bundled bluetooth implementation that would allow the attacker to trigger execution of those opcodes, and control their arguments?