Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Trellix Source Code Breach: Hackers Access Repository
May 2, 2026
Hackers Exploit cPanel Flaw to Breach Government Military
May 2, 2026
Exim Mail Server Vulnerabilities Lead to Crash via DNS Data
May 2, 2026
Home/CyberSecurity News/WPair Tool Detects WhisperPair Flaw Scanner Google’s
CyberSecurity News

WPair Tool Detects WhisperPair Flaw Scanner Google’s

A new Android application, WPair, has emerged, designed to identify and demonstrate the CVE-2025-36911 vulnerability. This critical flaw affects millions of Bluetooth audio devices worldwide. The...

David kimber
David kimber
January 20, 2026 3 Min Read
0 0

A new Android application, WPair, has emerged, designed to identify and demonstrate the CVE-2025-36911 vulnerability. This critical flaw affects millions of Bluetooth audio devices worldwide.

The tool addresses a critical authentication bypass flaw discovered by KU Leuven researchers in Google’s Fast Pair protocol, commonly referred to as WhisperPair.​

CVE-2025-36911 represents a systemic failure in Fast Pair implementations across multiple manufacturers and chipsets. The vulnerability stems from improper enforcement of pairing mode verification.

WPair Scanner for WhisperPair Flaw (source : GitHub )
WPair Scanner for WhisperPair Flaw (source: zalexdev GitHub)

According to the WhisperPair research, many devices fail to disregard pairing requests from unauthorized sources when not explicitly in pairing mode.

Allowing attackers to forcibly establish connections within seconds at ranges up to 14 meters. The attack requires no user interaction or physical device access, making it particularly dangerous for consumer audio equipment.​

WPair Functionality

The application provides three core scanning and testing modes. The BLE Scanner discovers nearby Fast Pair devices by identifying devices that broadcast the 0xFE2C service UUID.

The Vulnerability Tester performs non-invasive checks to determine patch status without establishing connections.

For authorized security research, the Exploit feature demonstrates the complete attack chain, including key-based pairing bypass, BR/EDR address extraction, and Bluetooth Classic bonding.​

Feature Description
BLE Scanner Detects Fast Pair devices in real time
Vulnerability Tester Checks CVE-2025-36911 patch status safely
Exploit Demo Proof-of-concept for authorized testing
HFP Audio Access Shows microphone access after exploit
Live Listening Streams audio to phone instantly
Audio Recording Saves captured audio for analysis
Device Status Detection Flags devices in pairing mode
Key-Based Bypass Demonstrates Fast Pair auth bypass
BR/EDR Extraction Retrieves Bluetooth Classic addresses
Classic Bonding Creates persistent audio connections
Account Key Persistence Demonstrates long-term device tracking

Post-exploitation capabilities include accessing the Hands-Free Profile for microphone functionality.

Users can enable live audio streaming directly to their phone speaker or save captured audio as M4A files for forensic analysis.​

The vulnerability allows attackers to hijack devices without authorization, enabling them to control audio playback, record conversations, and potentially establish persistent tracking through Google’s Find Hub Network.

If a device has never connected to an Android device, attackers can add it to their own account for location tracking, exploiting the mechanism that designates the first Account Key writer as the device owner.​

WPair Work flow (source: GitHub)
WPair Work flow (source: zalexdev GitHub)

Affected manufacturers include JBL, Harman Kardon, Sony, Marshall, and numerous others, impacting an estimated hundreds of millions of users globally.

Technical Requirements and Installation Options

Category Details
Minimum Android Version Android 8.0 (API 26) or higher
Bluetooth Support Bluetooth Low Energy (BLE) required
Permissions Location permissions (or Nearby Devices on Android 13+)
Installation – APK Download pre-compiled APK from Releases
Installation – Source Build Build from source using Gradle

Google classified this issue as critical and awarded researchers the maximum $15,000 bounty. The 150-day disclosure window ended in January 2026, and manufacturers are now releasing patches.

WPair explicitly excludes Find Hub Network provisioning functionality to maintain ethical boundaries around stalkerware implementation.​

WPair requires Android 8.0 or higher with Bluetooth LE support and appropriate location permissions. The application is available both as a precompiled APK and as a compiled source via Gradle.

According to the advisory, security researchers should verify they possess explicit written authorization before testing devices they do not own.

The tool represents a significant advancement in vulnerability assessment for the IoT audio ecosystem, enabling manufacturers and security teams to identify affected devices requiring immediate firmware updates.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityVulnerability

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Hacker Pleads Guilty: Stole Supreme Court Stealing Documents

Next Post

Gootloader Evades Most Security Tools with Low Detection Rate

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
cPanelSniper PoC Exploit for cPanel Vulner Disclosed Vulnerability
May 2, 2026
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us