WPair — CVE-2025-36911 (WhisperPair) Vulnerability Scanner &... #1779
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Title/Project: WPair — “CVE-2025-36911 (eg WhisperPair) Vulnerability Scanner & Research Tool” (Android/Kotlin app).
What this repo is: A defensive security research Android application (Kotlin) intended for authorized testing that can:
🔧 Technical Details
Fast Pair device discovery via BLE service UUID (0xFE2C): Identify Google Fast Pair-capable devices by scanning BLE advertisements for the Fast Pair service UUID 0xFE2C. Any device advertising this UUID can be treated as a candidate for deeper Fast Pair GATT interactions (e.g., connecting over GATT and reading identifying fields like the Model ID).
Non-invasive vulnerability detection by probing Key-Based Pairing signature enforcement: After a GATT connection is established and the device’s Model ID is read, attempt a Key-Based Pairing write/operation explicitly described as “no signature”. If the device accepts the unsigned operation, classify it as vulnerable to CVE-2025-36911; if rejected, treat as patched; if device state prevents a reliable probe (e.g., already paired), report the result as inconclusive.
BLE→BR/EDR pivot by extracting the class...
🤖 Agent Actions
Summary:
Files Modified:
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.