This white paper presents the findings and security vulnerabilities that were identified during our research into Airoha-based Bluetooth headphones and earbuds (CVE-2025-20700, CVE-2025-20701, and CVE-2025-20702). Our research identifies implementation flaws that can allow an attacker within Bluetooth range to bypass any authentication or pairing procedures and gain direct access to a device’s internal memory. Several reputable headphone and earbud vendors have built products based on Airoha’s SoCs and reference implementations using Airoha’s SDK.
The white paper demonstrates that on many of these devices the proprietary RACE protocol is accessible without any authentication or pairing. This lack of authentication provides an unauthenticated attacker within Bluetooth range with powerful capabilities, including: