A newly released proof-of-concept (PoC) exploit has disclosed a severe code-execution vulnerability affecting the Nothing Phone (2a) and the CMF Phone 1, both of which are powered by MediaTek chipsets. The exploit, named “fenrir”, compromises the secure boot process, allowing attackers to execute arbitrary code at EL3, the most privileged level in the ARM architecture.
First seen on thecyberexpress.com
Jump to article: thecyberexpress.com/fenrir-poc-for-nothing-phone-2a-cmf1/
![]()

