Headphone Jacking: A Key to Your Phone

No ratings

Presented at HITCON 2025 by

Bluetooth headphones are everywhere, and we were wondering what we can do with them if we hack them? Sure, we can probably do things like finding out what the person is listening to. But what else? During our research we discovered three vulnerabilities in popular Bluetooth audio SoCs by Airoha that are used by many popular device manufacturers. These vulnerabilities may cause a complete device compromise. We demonstrate the immediate impact using a pair of current-generation headphones. Finally, we show how a compromised Bluetooth peripheral can be abused to attack paired devices due to their trust relationship with the peripheral.