Sections
Browse by chapter
I
Introduction
Why zero-click chains matter and what the 2025 case reveals.
II
Background
The C memory model, CWE classes, iOS media pipeline, FORCEDENTRY precedent.
III
Methodology
CVE selection, analysis framework, Phoenix heap-two pedagogical bridge.
IV
Case Study
The 2025 chain: delivery (CVE-2025-55177) and exploitation (CVE-2025-43300).
V
Discussion
Why mitigations failed, sandbox escape, structural alternatives.
VI
Conclusion
Findings and recommendations.
Citation
Cite this paper
IEEE-format BibTeX entry:
@inproceedings{wagner2026zeroclick,
title = {Zero-Click, Old Tricks: Anatomy of the 2025 WhatsApp--ImageIO Exploit Chain},
author = {Wagner, {\c S}tefan-Daniel and Oltean, Dan-Gabriel and Matveev, Victor-Nicolae},
booktitle = {Master's Research, Metodologia Cerceta\u{r}ii {\c S}tiin\c{t}ifice},
school = {Universitatea Na{\c t}ional\u{a} de {\c S}tiin{\c t}\u{a} {\c s}i Tehnologie POLITEHNICA Bucure{\c s}ti},
year = {2026},
note = {Coordinator: Emil Simion}
}