➀ A hidden feature in the widely-used ESP32 microcontroller allows attackers to spoof devices, steal data, and install malware, posing risks to millions of IoT devices.
➁ The vulnerability stems from hidden commands in the Bluetooth Host Controller Interface (HCI), which are typically used for debugging but can be exploited for malicious purposes.
➂ Espressif, the manufacturer of ESP32, acknowledges the issue but claims these commands are for internal testing. Users are advised to conduct security audits and follow best practices to mitigate risks.