CVE-2025-55177
Insufficient authorization of linked-device synchronization messages allowed an unrelated user to trigger processing of arbitrary content from a URL on the victim's device — with no tap, no preview, no user action of any kind.
Neither bug alone is enough. Stage 1 delivers a malicious image to the victim's device with no interaction; stage 2 turns parsing that image into code execution.
Insufficient authorization of linked-device synchronization messages allowed an unrelated user to trigger processing of arbitrary content from a URL on the victim's device — with no tap, no preview, no user action of any kind.
A mismatch between SamplesPerPixel declared in
TIFF/EXIF metadata and the component count encoded in the
JPEG Lossless SOF3 marker allowed a crafted DNG
image to write past the bounds of a heap buffer — exploited
in the wild as part of a sophisticated attack against
targeted individuals.