• Dekkia@this.doesnotcut.it
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    6 days ago

    Someone correct me if i’m wrong, but it looks like it’s not the big deal the original blog post makes it out to be.

    To issue those undocumented HCI commands one either needs to hijack a computer/soc/mcu that is connected to an esp32 with HCI UART transport enabled or put malicious software on the esp itself.

    The mac spoofing might be interesting for people building hacking tools, however.

      • chaospatterns@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        6 days ago

        No way they’re on the same level. Heartbleed allowed for remote memory reads. This requires you to have access to change the firmware and just gives you some more APIs to control the WiFi system and possibly bypass firmware verification.