Critical Snapdragon Exploit Takes Over Devices in Just 5 Minutes – What You Need to Know

Cristian Penisoara
By
Cristian Penisoara
Avatar photo
Guides Writer
Cristian Penisoara writes practical Android guides and app explainers for Droid Tools. He has been an Android user since 2012 and brings a hands-on approach to...
- Guides Writer
3 Min Read
Trust this source on Google
Always see our content first in your search results
Add trusted source

Kaspersky ICS CERT has publicly detailed a critical hardware vulnerability hitting a wide array of Qualcomm Snapdragon chipsets. The exploit, presented at Black Hat Asia 2026 on April 23 and tracked as CVE-2026-25262, has rattled the security community. First confirmed by Qualcomm in April 2025, full technical details are now available, exposing a backdoor capable of total device takeover and data destruction.

snapdragon exploit takes over device

The Sahara Protocol and BootROM Flaw

The issue lies deep in the BootROM, the silicon-hardcoded firmware that runs first when a device powers up. Because this code is etched into the hardware itself, standard OTA software updates can’t touch it, making patches nearly impossible.

Researchers uncovered a major weakness in Qualcomm‘s Sahara protocol handling. For those who work with device flashing, Sahara manages low-level communication in Emergency Download (EDL) mode to load critical software before the main OS starts.

With just a few minutes of physical access, attackers can exploit this to sidestep the entire secure boot chain. Once inside the application processor, they gain the ability to:

  • Install persistent backdoors that survive reboots.
  • Pull sensitive data like passwords, files, contacts, and real-time location.
  • Take over device sensors for covert camera and microphone access.

The malware even fakes a system reboot to throw off users. Clearing the infection often requires draining the battery completely to wipe volatile memory, and detection remains extremely challenging.

Affected Chipsets and Devices

While newer flagships like Snapdragon 8 Elite have stronger defenses, this flaw hits many older and mid-range chips still in widespread use.

Vulnerable Qualcomm Chipsets:

  • MSM8916 (Snapdragon 410) (Xiaomi REDMI 2)
  • SDX50 (Xiaomi Mi MIX 3 5G and Mi 9 Pro 5G)
  • MDM9x07
  • MDM9x45 (Xiaomi Mi 5, Mi 5s, Mi 5s Plus, Mi Note 2, Mi MIX)
  • MDM9x65
  • MSM8909
  • MSM8952

Real-World Impact

Physical access requirements limit mass remote attacks, but the risk to supply chains, repair shops, and targeted users remains severe. Compromised devices turn into perfect surveillance tools. With hardware deployed across consumer REDMI phones to industrial IoT systems, the potential fallout spans far beyond typical mobile threats.

Source: Kaspersky

Trust this source on Google
Always see our content first in your search results
Add trusted source
Share This Article
Avatar photo
Guides Writer
Follow:
Cristian Penisoara writes practical Android guides and app explainers for Droid Tools. He has been an Android user since 2012 and brings a hands-on approach to every tutorial — every step is tested on a real device before it goes live, so readers aren't following instructions that don't work. He specialises in making complex OS features accessible, from setting up advanced privacy controls to getting the most from Android's battery optimisation tools. Before Droid Tools, Cristian worked as an event photographer — a background that sharpens his eye for detail and informs his practical, real-world approach to tech.
Leave a Comment

Leave a Reply

Your email address will not be published. Required fields are marked *