Published on: 2025-06-22 06:23:03
Espressif’s Response to Claimed Backdoor and Undocumented Commands in ESP32 Bluetooth Stack Recently, some media have reported on a press release initially calling out ESP32 chips for having a “backdoor”. Espressif would like to take this opportunity to clarify this matter for our users and partners. Recently, some media have reported on a press release initially calling out ESP32 chips for having a “backdoor”. Of note is that the original press release by the Tarlogic research team was factua
Keywords: chips commands esp32 espressif security
Find related items on AmazonPublished on: 2025-06-25 17:46:00
A hot potato: The ESP32 chip, found in over a billion devices worldwide, contains undocumented vendor-specific commands that could potentially be misused to access device memory and manipulate Bluetooth functionality. Security experts emphasize that these commands are not directly accessible remotely without additional vulnerabilities and typically require physical access or already compromised firmware to exploit. An undocumented set of low-level commands has been discovered in the ESP32 micro
Keywords: bluetooth commands devices esp32 security
Find related items on AmazonPublished on: 2025-06-24 21:12:23
Update 3/9/25: After receiving concerns about the use of the term 'backdoor' to refer to these undocumented commands, we have updated our title and story. Our original story can be found here. The ubiquitous ESP32 microchip made by Chinese manufacturer Espressif and used by over 1 billion units as of 2023 contains undocumented commands that could be leveraged for attacks. The undocumented commands allow spoofing of trusted devices, unauthorized data access, pivoting to other devices on the net
Keywords: bluetooth commands devices esp32 tarlogic
Find related items on AmazonPublished on: 2025-06-25 14:32:56
Building an open-source Wi-Fi MAC layer for the ESP32 The ESP32 is a low-cost microcontroller with Wi-Fi connectivity. Currently, the Wi-Fi MAC layer of the ESP32 is closed-source. This project aims to change that: by reverse engineering the hardware registers and software, we can build a networking stack that is open-source up to the hardware, instead of having to use the proprietary MAC layer. This will improve security auditability, open up the possibility for features not supported in the
Keywords: esp32 fi hardware mac open
Find related items on AmazonPublished on: 2025-06-25 12:12:23
The ubiquitous ESP32 microchip made by Chinese manufacturer Espressif and used by over 1 billion units as of 2023 contains an undocumented backdoor that could be leveraged for attacks. The undocumented commands allow spoofing of trusted devices, unauthorized data access, pivoting to other devices on the network, and potentially establishing long-term persistence. This was discovered by Spanish researchers Miguel Tarascó Acuña and Antonio Vázquez Blanco of Tarlogic Security, who presented their
Keywords: backdoor bluetooth commands esp32 tarlogic
Find related items on AmazonPublished on: 2025-06-25 12:30:38
The ubiquitous ESP32 microchip made by Chinese manufacturer Espressif and used by over 1 billion units as of 2023 contains an undocumented backdoor that could be leveraged for attacks. The undocumented commands allow spoofing of trusted devices, unauthorized data access, pivoting to other devices on the network, and potentially establishing long-term persistence. This was discovered by Spanish researchers Miguel Tarascó Acuña and Antonio Vázquez Blanco of Tarlogic Security, who presented their
Keywords: backdoor bluetooth commands esp32 tarlogic
Find related items on AmazonGo K’awiil is a project by nerdhub.co that curates technology news from a variety of trusted sources. We built this site because, although news aggregation is incredibly useful, many platforms are cluttered with intrusive ads and heavy JavaScript that can make mobile browsing a hassle. By hand-selecting our favorite tech news outlets, we’ve created a cleaner, more mobile-friendly experience.
Your privacy is important to us. Go K’awiil does not use analytics tools such as Facebook Pixel or Google Analytics. The only tracking occurs through affiliate links to amazon.com, which are tagged with our Amazon affiliate code, helping us earn a small commission.
We are not currently offering ad space. However, if you’re interested in advertising with us, please get in touch at [email protected] and we’ll be happy to review your submission.