Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
CloudZ RAT Steals SMS OTPs via Microsoft Phone Abuses Link
May 6, 2026
QLNX Credential Theft Targets Developers for Supply Chain Comprom
May 6, 2026
MajorDoMo RCE Vulnerability Exposes Servers Code Execution
May 6, 2026
Home/CyberSecurity News/Redmi Buds Flaw Exposes Call Data & Vulnerability Allow
CyberSecurity News

Redmi Buds Flaw Exposes Call Data & Vulnerability Allow

Significant firmware vulnerabilities have been identified by security researchers across Xiaomi’s popular Redmi Buds series. These flaws affect models from the Redmi Buds 3 Pro to the latest Redmi...

Emy Elsamnoudy
Emy Elsamnoudy
January 19, 2026 3 Min Read
1 0

Significant firmware vulnerabilities have been identified by security researchers across Xiaomi’s popular Redmi Buds series. These flaws affect models from the Redmi Buds 3 Pro to the latest Redmi Buds 6 Pro.

The discovery highlights critical flaws in the Bluetooth implementation of these devices, allowing attackers to access sensitive information or force the devices offline. These exploits leverage the RFCOMM protocol and can be executed by an attacker within radio range without ever pairing with the target device.

Redmi Buds Vulnerability

The core of the issue lies in how the Redmi Buds firmware manages the RFCOMM control and signaling mechanisms. While the product specifications advertise standard support for profiles like HFP and A2DP, the devices actively monitor undocumented internal channels likely used for auxiliary services.

The first vulnerability, tracked as CVE-2025-13834, is an information leak caused by improper bounds checking. This flaw functions similarly to the infamous Heartbleed bug found in web servers years ago.

When the device receives a specifically crafted TEST command with a manipulated length field on its control channel, the firmware fails to validate the request properly.

Instead of rejecting the malformed packet, the system reads from uninitialized memory and returns up to 127 bytes of data to the attacker. This out-of-bounds read can expose highly sensitive information residing in the memory pool, including the phone numbers of active call peers.

The second vulnerability, CVE-2025-13328, is a Denial of Service (DoS) flaw resulting from the firmware’s inability to handle high-volume traffic.

Attackers can flood the standard control channel or undocumented service channels with legitimate TEST commands or Modem Status Command signaling frames.

This flood overwhelms the device’s processing queue, leading to resource exhaustion. The result is a firmware crash that forcibly disconnects the user from their paired device.

CVE ID Vulnerability Type Impact Severity
CVE-2025-13834 Information Leak Allows attackers to read uninitialized memory, potentially exposing phone numbers and metadata. Critical
CVE-2025-13328 Denial of Service Enables attackers to crash firmware and force device disconnection via packet flooding. High

Exploitation and Operational Impact

The most alarming aspect of these vulnerabilities is the low barrier to entry for potential attackers. Exploitation does not require authentication, PIN pairing, or any user interaction.

An attacker only requires the MAC address of the target earbuds, which can be easily obtained using standard Bluetooth sniffing tools.

Tests conducted by researchers demonstrated that these attacks could be successfully executed from approximately twenty meters away using standard dongles, though obstacles like walls may reduce this range.

The operational impact on the user varies from privacy invasion to persistent disruption. The information leak poses a confidentiality risk, particularly for users conducting private calls in public spaces.

The attacker can repeatedly trigger the memory leak without the user noticing. Conversely, the Denial of Service attack disrupts availability. Once the firmware crashes, the earbuds become unresponsive and disconnect from the audio source, according to the CERT/CC note.

To restore functionality, the user must physically place the earbuds back into their charging case to initiate a reset, creating a significant nuisance if the attack is automated and repeated.

As of the disclosure of these findings, Xiaomi has not provided a statement regarding a firmware patch or specific remediation plans. The vulnerabilities were credited to researchers Choongin Lee, Jiwoong Ryu, and Heejo Lee.

Until a firmware update addresses the improper bounds-checking and resource-management issues, users are advised to disable Bluetooth on their mobile devices when not actively using their earbuds, especially in high-density public environments where the risk of local RF exploitation is highest.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityVulnerability

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

List of 10 Best Most Exploited Vulnerabilities 2016 to 2026

Next Post

New Kerberos Relay Attack Bypasses Mitigations via DNS

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Prolific Russian Ransomware Member Sentenced to Group Months
May 6, 2026
Detect Phishing-to-RMM Attacks Analysts Trusted-Tool
May 6, 2026
Hackers Exploit Microsoft Teams to Steal Credentials &
May 6, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us