millions of product users
On March 20, 2026, researchers disclosed a critical vulnerability in the modem firmware of several UNISOC chipsets. These chipsets power millions of budget and mid-range Android smartphones from popular brands such as Motorola, Samsung, Vivo, and Realme. The unpatched flaw, identified as an Uncontrolled Recursion (CWE-674), can be exploited by a remote attacker over a cellular network to achieve remote code execution (RCE). The attack vector is remarkably simple: the attacker initiates a cellular video call and sends a malformed Session Description Protocol (SDP) message. This triggers a stack overflow in the modem, allowing the attacker to execute arbitrary code. The vulnerability requires no user interaction, making it a zero-click style attack on the modem's baseband processor, which operates at a high privilege level.
CWE-674: Uncontrolled RecursionThe vulnerability has been confirmed in the modem firmware of the following UNISOC chipset models:
T612T616T606T7250These chipsets are found in numerous Android devices, including the Realme C33, on which a full RCE exploit was successfully demonstrated. The affected device was running a July 2025 Android security update, indicating the flaw is likely present in many current and older devices and is not mitigated by standard Android OS patches.
The vulnerability lies in the modem firmware's handling of the Session Initiation Protocol (SIP), which is used to set up voice and video calls over LTE (VoLTE). Specifically, the flaw is in a function named _SDPDEC_AcapDecoder.
acap._SDPDEC_AcapDecoder function, which processes the acap attribute, calls itself recursively. However, the developers failed to implement a depth check to limit how many times the function could recurse.acap attributes. When the vulnerable modem receives this message, the _SDPDEC_AcapDecoder function calls itself repeatedly, consuming stack space with each call. This leads to a classic stack overflow, which corrupts the program's execution state.T1210 - Exploitation of Remote Services).This type of vulnerability is particularly dangerous because it targets the modem's firmware (the baseband processor), which is a separate computer within your phone. A compromise of the baseband can be invisible to the Android operating system and any security software running on it.
Detection on the device itself is nearly impossible for a user. Detection would have to occur at the network level.
| Type | Value | Description |
|---|---|---|
network_traffic_pattern |
(malformed SDP) |
A cellular carrier could potentially detect malformed SDP packets containing an abnormally large number of acap attributes traversing their network. |
other |
Modem Crash Logs |
On the device, repeated and unexplained modem crashes (which would appear as loss of signal) could be an indicator of attack attempts. These logs are typically only accessible with developer tools. |
Apply firmware updates from the device manufacturer as soon as they become available.
As a temporary measure, disabling VoLTE functionality might prevent the vulnerable code path from being triggered.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats