We have gone over a few occurrences with respect to Android vulnerabilities. A group of researchers has led a fascinating exploration on the set of AT commands which is  supported on current our Android devices. A group of researchers includes the following.

  • University of Florida
  • Stony Brook University
  • Samsung Research America

The AT commands is a collection of strings which were intended to transmit by means of telephone line and modems, thinking back to the 1980s. Prior, these commands were utilized for a modem dial-up, hang up, and change particular settings.

After some time, the utilization of AT commands ventured into present day protocols like SMS messaging, 3G, and LTE, and even came to incorporate custom commands for things like propelling a camera or controlling a touchscreen on a smartphones.

Be that as it may, the majority of the present Android gadgets still supports these AT commands. Despite the fact that the media transmission administrative bodies have set out a list of AT commands, OEM’s have included a few of their own which could demonstrate unsafe, if at any point hacked.

The researchers dissected a scope of smartphones from various merchants. They assumed control 2,000 Android smartphones firmware photo all through 11 distributors. Researches were able to build a database of 3500 commands are supported on a portion of the OEM’s gadgets. The following are rundown of couple of vulnerable OEM’s;

  • ASUS
  • Google
  • HTC
  • Huawei
  • Lenovo
  • LG
  • LineageOS
  • Motorola
  • Samsung
  • Sony
  • ZTE

The researchers found that there are distinctive assaults utilizing AT commands, including firmware blazing, Android security instrument bypassing by making calls through USB, opening screens, infusing contact occasions, exfiltrating touchy information, and so on.

With a specific end goal to execute this sort of vulnerability, the attacker should simply shroud the malicious content in any charging station, chargers or USB docks. Once the objective smartphones is associated with the USB, the attacker can encroach the device and exploit the gadget AT commands for malicious activities.

The researchers have just advised the respective sellers and even posted a list of smartphone models and firmware forms that are presented to AT commands risk.

LG G4 getting hacked using AT commands injection

Related Read

Android 9 Pie Hidden Features You Should Know About

Google Warns That Android May Not Be Free In The Future

Google Details Display Notch Guidelines for Android Manufacturers


Please enter your comment!
Please enter your name here