The Bluetooth Classic implementation on AB32VG1 devices does not properly handle the reception of continuous unsolicited LMP responses, allowing attackers in radio range to trigger a denial of service (either restart or deadlock the device) by flooding a device with LMP_AU_rand data.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
mi mi_true_wireless_earbuds_basic_2_firmware - |
||
bluetrum ab5376t_firmware - |
||
bluetrum bt8896a_firmware - |