Replies: 2 comments 1 reply
-
Just read the first paragraph of https://www.flyingpenguin.com/?p=67838 (first link from https://nvd.nist.gov/vuln/detail/CVE-2025-27840 ) There is no issue whatsoever - this is just undocumented functionality that's no use to external hackers. If you can run arbitrary code on the ESP32 then yes you can use them, but if a hacker can run arbitrary code then honestly you've got more to worry about than this! IMO it just makes a mockery of the vulnerability reporting system (I can't believe the CVE even links to this post now!). It's extremely clickbait reporting by bleepingcomputer too - note if you look now they've had to remove the word 'backdoor' from the article. |
Beta Was this translation helpful? Give feedback.
-
Espressif's response: https://www.espressif.com/en/news/response_esp32_bluetooth |
Beta Was this translation helpful? Give feedback.
-
https://nvd.nist.gov/vuln/detail/CVE-2025-27840 describes the existence of undocumented command on the ESP32 that potentially act as backdoors. There's an article here:
https://www.bleepingcomputer.com/news/security/undocumented-commands-found-in-bluetooth-chip-used-by-a-billion-devices/
Beta Was this translation helpful? Give feedback.
All reactions