I really haven’t seen any details. Most comments I’ve read indicate they think you already have to have access to the device and that this is just undocumented opcode calls. I.e. not a remote Bluetooth stack issue or remotely exploitable.
Given an opcode, as noted in the article (vague on details) and yes, I did read it. This doesn’t give me much cause for alarm.
rumba@lemmy.zip 20 hours ago
Sounds like the attack is Bluetooth based itself.
So if somebody has command and control over any IoT device with Bluetooth…