Headphone Jacking: A Key to Your Phone
We discovered three vulnerabilities in popular Bluetooth audio devices that allow a complete device compromise. We demonstrate the immediate impact using a pair of current-generation headphones. Finally, we show how a compromised Bluetooth peripheral can be abused to extract data the paired smartphone.