UNISOC T612 调制解调器严重漏洞:恶意蜂窝视频呼叫可实现远程代码执行
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。用户给的文章是关于UNISOC T612基带芯片的一个严重漏洞,允许远程代码执行。首先,我需要理解文章的主要内容。 文章提到这个漏洞是一个内存破坏问题,攻击者可以通过恶意视频通话远程控制设备。影响范围包括多个手机品牌和市场。漏洞位于SIP/SDP解析路径中,存在无限制递归的条件,导致堆栈溢出和代码执行。 接下来,我需要提取关键点:漏洞类型、影响范围、攻击方式、技术细节和潜在风险。然后,用简洁的语言把这些点整合起来,确保不超过100字。 可能的结构是:描述漏洞及其影响,攻击方式,技术细节,以及潜在后果。这样可以全面覆盖主要内容而不冗长。 最后,检查字数是否符合要求,并确保语言流畅自然。 </think> UNISOC T612基带芯片存在严重内存破坏漏洞,可通过恶意视频通话实现远程代码执行。该漏洞影响多个手机品牌及新兴市场设备。攻击者利用SIP/SDP解析中的无限制递归条件引发堆栈溢出,并通过恶意SDP数据包注入shellcode控制设备。此漏洞对高风险用户及依赖UNISOC设备的运营商构成重大威胁。 2026-3-20 12:9:6 Author: cyberpress.org(查看原文) 阅读量:0 收藏

A critical memory-corruption flaw in UNISOC’s T612 modem family allows remote code execution (RCE) on vulnerable Android devices using only a malicious cellular video call, enabling one phone to compromise another over the mobile network layer.

UNISOC, ecosystem impact

UNISOC is a top-three global fabless semiconductor vendor headquartered in Shanghai, supplying 2G–5G, IoT, and smart device chipsets to OEMs such as Honor, realme, vivo, Samsung, and Motorola, with deployments in over 140 countries.

The vulnerable baseband stack ships in popular budget and mid-range Android phones, including the realme C33, significantly amplifying the potential attack surface across emerging markets where UNISOC penetration is highest.

The flaw lies in the UNISOC modem firmware’s SIP/SDP parsing path, specifically an exploitable Uncontrolled Recursion condition (CWE‑674) in the _SDPDEC_AcapDecoder function that handles the nonstandard acap attribute.

After parsing one acap attribute, the function consults the SipHandler_AttrDecoder table and may re-invoke itself for the next attribute without enforcing any recursion or depth limit, allowing attacker-controlled SDP to drive unbounded stack consumption.

By placing many acap attributes on a single SDP line, an attacker can force the SIP task’s stack to collide with the sblock_0_2 task’s stack, causing a stack overflow within the baseband RTOS context.

Subsequent overwrite of function pointers sblock_0_2 enables redirection of execution to attacker-supplied ARM Thumb shellcode delivered via a separate crypto attribute, demonstrating native code execution in the modem.

Exploitation is performed entirely over the cellular IMS/VoLTE signaling plane using malformed SDP embedded in SIP INVITE messages.

In the researcher’s setup, a Dockerized Open5GS core with Kamailio is used alongside a LimeSDR-based 4G cell, and Osmocom sysmoISIM USIM cards, with the attacker UE implemented as a pwntools-based container that registers to IMS and sends crafted INVITEs.

The vulnerable target is a realme C33 handset (UNISOC T612) with July 1, 2025, Android security patches, showing that Android framework updates do not mitigate the baseband flaw.

A video call from the attacker device is sufficient: SRTP traffic triggers fragmentation, activates the sblock_0_2 task, and once the victim answers, the modem crashes and ultimately executes the injected shellcode, confirmed post-crash by modem memory dumps and register analysis showing 0xdeadbeef written to a controlled address.

Testing confirmed the issue in the firmware image MOCORTM_22A_W23.02.5_P12.14_Debug as deployed on the realme C33.

Analysis indicates that at least the following UNISOC SoCs share the vulnerable SDP parser implementation: T612, T616, T606, and T7250, implying risk across multiple handset lines built on this modem codebase.

The vulnerability was independently discovered by researcher 0x50594d in collaboration with SSD Secure Disclosure, which attempted to contact UNISOC via email and LinkedIn but received no response at the time of publication.

In the absence of patches or public advisories from the vendor, devices using the affected firmware remain exposed to remote, baseband-level compromise via nothing more than a malicious cellular video call from any reachable number.ssd-disclosure+1

Given that exploitation occurs in the modem, below the Android OS boundary, successful RCE could enable covert interception, location tracking, or persistent compromise that survives typical device forensics, making this flaw particularly critical for high-risk users and operators relying on UNISOC-based infrastructure.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google

AnuPriya

AnuPriya

Any Priya is a cybersecurity reporter at Cyber Press, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends.


文章来源: https://cyberpress.org/critical-unisoc-t612-modem-flaw/
如有侵权请联系:admin#unsafe.sh