Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks .
Read moreWhat is baseband in a phone?
The vulnerabilities are found in the interface used to communicate with the baseband firmware, the software that allows the phone’s modem to communicate with the cell network , such as making phone calls or connecting to the internet.8 Kas 2019
Read more