Comment by 20after4

1 month ago

They say "backdoor might be possible via malicious firmware or rogue Bluetooth connections."

Malicious firmware is not a RCE. If you install a malicious firmware you can do all kinds of bad stuff without this undocumented behavior.

And "rogue Bluetooth connections" is entirely theoretical. That MIGHT be a RCE, but it is not one. More of a hypothesis.

The headline alludes to much more than they have actually demonstrated. I'll change my tune when they demo the exploit code.