【Hindi Dubbed Archives】
A potential security issue has been discovered by cybersecurity researchers that has the capability to affect more than one billion devices.
According to researchers at the cybersecurity firm Tarlogic,Hindi Dubbed Archives a hidden command has been foundcoded into a bluetooth chip installed in devices around the world. This secret functionality can be weaponized by bad actors and, according to the researchers, used as an exploit into these devices.
Using these commands, hackers could impersonate a trusted device and then connect to smartphones, computers, and other devices in order to access information stored on them. Bad actors can continue to utilize their connection to the device to essentially spy on users.
You May Also Like
The bluetooth chip is called ESP32 and is manufactured by the China-based company Espressif. According to researchers, the ESP32 is "a microcontroller that enables WiFi and Bluetooth connection." In 2023, Espressif reported that one billion units of its ESP32 chip had been sold globally. Millions of IoT devices like smart appliances utilize this particular ESP32 chip.
Tarlogic researchers say that this hidden command could be exploited, which would allow "hostile actors to conduct impersonation attacks and permanently infect sensitive devices such as mobile phones, computers, smart locks or medical equipment by bypassing code audit controls." Tarlogic says that these commands are not publicly documented by Espressif.
Researchers with Tarlogic developed a new Bluetooth driver tool in order to aid in Bluetooth-related security research, which enabled the security firm to discover a total of 29 hidden functionalities that could be exploited to impersonate known devices and access confidential information stored on a device.
According to Tarlogic, Espressif sells these bluetooth chips for roughly $2, which explains why so many devices utilize the component over higher costing options.
As BleepingComputerreports, the issue is being tracked as CVE-2025-27840.
Topics Bluetooth Cybersecurity
Search
Categories
Latest Posts
NYT mini crossword answers for May 9, 2025
2025-06-26 19:04Move over Gigi, Tweety the canary is modeling's new fresh face
2025-06-26 18:42Girl Scouts dress as influential women for Women's History Month
2025-06-26 18:38Nintendo takes us through the four
2025-06-26 18:23Popular Posts
What's Thermal Throttling and How to Prevent It
2025-06-26 19:23Prince William's dad dancing is the internet's latest obsession
2025-06-26 19:11Gods of War
2025-06-26 18:34Featured Posts
The Mismeasure of Media
2025-06-26 19:34Girl Scouts dress as influential women for Women's History Month
2025-06-26 18:34People are pissed they didn't get more snow during Blizzard 2017
2025-06-26 18:26NYT mini crossword answers for April 24, 2025
2025-06-26 17:49Popular Articles
It's Time to Reinvent the Digital Pen
2025-06-26 18:58Sure you're not a robot? Solve this chess puzzle and prove it.
2025-06-26 18:02'This Is Us' bosses promise less tears and more laughs in Season 2
2025-06-26 17:58Commissioning Misleading Core i9
2025-06-26 17:32Newsletter
Subscribe to our newsletter for the latest updates.
Comments (5267)
Highlight Information Network
MacBook Air reviews: 4 features critics loved, 4 they didn’t
2025-06-26 19:57Micro Video Information Network
NBD, Allo could just tell your Google history to your mom
2025-06-26 18:58Smart Information Network
Girl Scouts dress as influential women for Women's History Month
2025-06-26 18:17Wisdom Information Network
Kal Penn shares cringeworthy audition scripts from his early days as an actor
2025-06-26 17:47Dream Information Network
Puerto Rico hurricane crisis: Here's why this could be Trump's Katrina
2025-06-26 17:32