Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

tl;dr whichever system using an ESP32 as a bluetooth adapter may also just run arbitrary code on the ESP32 itself over the same interface. Commands have to be issued from the host system, not from the air.

This sounds like... a good feature? There are indeed some scenarios where doing so poses a security risk. But most of the time I do want to be able to run arbitrary code on e.g. my WiFi dongle when I'm in control. I know FCC is not a fan of this idea though.



I agree! Your system is already heavily compromised if this is a problem for you.

I think the real problem lies in a lack of visibility into the state of the device. A compromised dongle could easily be transferred between machines. What we need is to make obvious what the machine/device is doing.


Esp32 devices support enforcement of signed firmware that prevents the issue if it's in your threat model.

https://docs.espressif.com/projects/esp-idf/en/stable/esp32/...


Unless you reverse engineer the radio firmware, i dont think you can change the RF front end much




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: