Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Exploited Samsung Galaxy S25 0-Day Vulnerability to Enable Camera and Track Location

Posted on October 23, 2025October 23, 2025 By CWS

At Pwn2Own Eire 2025, cybersecurity researchers Ben R. and Georgi G. from Interrupt Labs showcased a formidable achievement by efficiently exploiting a zero-day vulnerability within the Samsung Galaxy S25.

This allowed them to realize full management over the machine, enabling them to activate the digital camera and monitor the consumer’s location.

The exploit, revealed on the occasion’s last day, highlights ongoing safety challenges in flagship Android smartphones regardless of rigorous testing by producers.

This breach underscores the high-stakes world of moral hacking competitions, the place vulnerabilities are disclosed responsibly to enhance world machine safety.​

The core challenge exploited by the Interrupt Labs workforce stemmed from an improper enter validation bug throughout the Galaxy S25’s software program stack, permitting attackers to bypass safeguards and execute arbitrary code remotely.

Samsung Galaxy S25 0-Day Vulnerability

By crafting malicious inputs, the researchers demonstrated how an adversary may silently hijack the machine with out consumer interplay, a way that evaded Samsung’s defenses throughout the stay contest.

This vulnerability, undisclosed previous to the occasion, enabled persistent entry, turning the premium smartphone right into a surveillance device able to capturing photographs, movies, and real-time GPS information.

One other huge affirmation! Ben R. And Georgi G. of Interrupt Labs used an improper enter validation bug to take over the Samsung Galaxy S25 – enabling the digital camera and site monitoring within the course of. They earn $50,000 and 5 Grasp of Pwn factors. #Pwn2Own pic.twitter.com/oNhdefPR7k— Development Zero Day Initiative (@thezdi) October 23, 2025

Specialists be aware that such flaws typically come up in multimedia or system libraries, the place fast characteristic improvement outpaces safety hardening.​

For his or her subtle exploit chain, Ben R. and Georgi G. earned $50,000 in prize cash together with 5 Grasp of Pwn factors, contributing to the occasion’s large $2 million whole payout throughout 73 distinctive zero-days.

Pwn2Own, organized by the Zero Day Initiative, rewards individuals for responsibly disclosing flaws, making certain distributors like Samsung obtain detailed experiences for patching.

Samsung has but to challenge a particular assertion on this Galaxy S25 exploit, however historic patterns counsel an imminent safety replace will deal with it, just like current fixes for different Android zero-days.

Customers are suggested to allow automated updates and monitor official channels for patches, as unmitigated exploits may expose delicate information in real-world assaults.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.


Cyber Security News Tags:0Day, Camera, Enable, Exploited, Galaxy, Hackers, Location, S25, Samsung, track, Vulnerability

Post navigation

Previous Post: SpaceX Disabled 2,500+ Starlink Terminals Tied to Scam Centers in Myanmar
Next Post: North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets

Related Posts

LG Innotek Camera Vulnerabilities Let Attackers Gain Administrative Access Cyber Security News
North Korean Hackers Attacking Developers with 338 Malicious npm Packages Cyber Security News
Writable File in Lenovo’s Windows Directory Enables a Stealthy AppLocker Bypass Cyber Security News
Threat Actors Weaponize PDF Editor With New Torjan to Turn Device Into Proxy Cyber Security News
Threat Actors Weaponizing RMM Tools to Take Control of The Machine and Steal Data Cyber Security News
Defy Security Appoints Esteemed Cybersecurity Leader Gary Warzala to Its Board of Directors Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Enhances Windows Security by Turning Off File Previews for Downloads
  • North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets
  • Hackers Exploited Samsung Galaxy S25 0-Day Vulnerability to Enable Camera and Track Location
  • SpaceX Disabled 2,500+ Starlink Terminals Tied to Scam Centers in Myanmar
  • Russian Government Now Actively Managing Cybercrime Groups: Security Firm

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Enhances Windows Security by Turning Off File Previews for Downloads
  • North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets
  • Hackers Exploited Samsung Galaxy S25 0-Day Vulnerability to Enable Camera and Track Location
  • SpaceX Disabled 2,500+ Starlink Terminals Tied to Scam Centers in Myanmar
  • Russian Government Now Actively Managing Cybercrime Groups: Security Firm

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News