Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Hijacking Bluetooth Accessories Using Google Fast Pair: WhisperPair CVE-2025-36911 Reference Implementation & Vulnerability Verification Toolkit | https://github.com/SpectrixDev/DIY_WhisperPair | POC Details |
| 2 | This script can be used to check if a Bluetooth device is vulnerable to CVE-2025-36911. | https://github.com/Cedric-Martz/CVE-2025-36911_scan | POC Details |
| 3 | WPair is a defensive security research tool that demonstrates the CVE-2025-36911 (eg WhisperPair) vulnerability in Google's Fast Pair protocol. This vulnerability affects millions of Bluetooth audio devices worldwide, allowing unauthorized pairing and potential microphone access without user consent. | https://github.com/zalexdev/wpair-app | POC Details |
| 4 | This is not an exploit for CVE-2025-36911!!! This is a detector for finding potentially vulnerable devices! Only use on your own devices! I am not responsible for damages! | https://github.com/SteamPunk424/CVE-2025-36911-Wisper_Pair_Target_Finder- | POC Details |
| 5 | This is not an exploit for CVE-2025-36911!!! This is a detector for finding potentially vulnerable devices! Only use on your own devices! I am not responsible for damages! | https://github.com/SteamPunk424/CVE-2025-36911-Wisper_Pair_Target_Finder | POC Details |
| 6 | WhisperPair (CVE-2025-36911) POC for ESP32 device | https://github.com/PivotChip/FrostedFastPair | POC Details |
| 7 | A Vulnerablity Scanner for Whisper Pair (CVE-2025-36911) | https://github.com/ap425q/whisper-pair | POC Details |
| 8 | A security research tool that identifies and demonstrates the CVE-2025-36911: Fast Pair Pairing Mode Bypass vulnerability | https://github.com/aalex954/whisperpair-poc-tool | POC Details |
| 9 | Exploit of the CVE-2025-36911 vulnerability in Python for testing our own equipment | https://github.com/PentHertz/CVE-2025-36911-exploit | POC Details |
| 10 | 🔍 Scan and research CVE-2025-36911 vulnerabilities with WPair, a specialized tool for Android built in Kotlin, ensuring your applications remain secure. | https://github.com/fa1sa1142/wpair-app | POC Details |
| 11 | 🛡️ Scan for CVE-2025-36911 vulnerabilities with WPair, a research tool designed for Android developers using Kotlin. Secure your applications effectively. | https://github.com/fa1sa1142/fa1sa1142.github.io | POC Details |
| 12 | BLUE-SPY (Bluetooth Low Energy Universal Exploit - Security Penetration Testing) is a professional security assessment tool for analyzing CVE-2025-36911 vulnerabilities in Google's Fast Pair protocol implementation. | https://github.com/Athexhacker/BLUE-SPY | POC Details |
No public POC found.
Login to generate AI POCNo comments yet