Unfixable Chip Flaw Lets Attackers Take Full Control Of Smartphones And Crypto Keys
A hardware vulnerability in a widely used MediaTek smartphone chip allows attackers to gain complete control of affected devices, according to a new report by crypto wallet provider Ledger.
The flaw lies in the Dimensity 7300 (MT6878) system-on-chip, used in many Android phones including the crypto-focused Solana Seeker.
Because the vulnerability exists in the chip’s boot ROM, the earliest stage of device startup, it cannot be corrected with a software update.
How Researchers Exploited The Chip
Ledger’s Donjon security team tested the MT6878 using electromagnetic fault injection (EMFI) attacks during the chip’s initial boot sequence.
By carefully timing these pulses, the researchers bypassed memory-access checks and escalated privileges to EL3, the highest level in the ARM architecture.
Ledger wrote,
“From malware that users could be tricked into installing on their machines, to fully remote, zero-click exploits commonly used by government-backed entities, there is simply no way to safely store and use one’s private keys on those devices.”
The team reported that each attempt in the lab took roughly a second and had a success rate between 0.1% and 1%.
Repeating the attack allows full compromise within minutes, demonstrating how even low-probability physical attacks can succeed with persistence.
Hardware Vulnerability Cannot Be Patched
Unlike software vulnerabilities, this flaw is embedded in the chip’s silicon.
Ledger emphasised that disclosure or software updates do not mitigate the risk.
The report stated,
“Users remain exposed even after disclosure.”
MediaTek acknowledged the issue but noted that EMFI attacks are outside the design scope of the MT6878, which is intended for consumer smartphones rather than financial or sensitive systems.
The company said,
“For products with higher hardware security requirements, such as hardware crypto wallets, we believe that they should be designed with appropriate countermeasures against EMFI attacks.”
Implications For Crypto Wallet Users
The vulnerability poses particular risks for crypto holders who store private keys on smartphones.
Hardware wallets, or “cold wallets,” remain a safer alternative, as they keep keys offline and shielded from both software and physical attacks.
Ledger emphasised the importance of secure-element chips for users relying on self-custody or other sensitive cryptographic operations.
The company wrote,
“Smartphones’ threat model, just like any piece of technology that can be lost or stolen, cannot reasonably exclude hardware attacks. The SoCs they use are no more exempt from the effects of fault injection than microcontrollers are, and security should really ultimately rely on Secure Elements, especially for self-custody.”
Solana Seeker And The Upcoming SKR Token
The MediaTek chip is used in the Solana Seeker, a mobile device marketed as a gateway for decentralized applications.
Ledger’s findings raise concerns about the security of private keys stored on such devices.
Solana Mobile plans to launch SKR, a native governance token for the Seeker ecosystem, in early 2026.
The token will have a total supply of 10 billion, with 30% earmarked for airdrops, 25% for growth and partnerships, 10% for liquidity, 10% for a community treasury, 15% for Solana Mobile, and 10% for Solana Labs.
According to the company, SKR is designed to give Seeker owners “actual ownership in the platform” and will feature linear inflation to reward early stakers.
Rising Threats To Cryptocurrency Holders
While physical attacks like this EMFI exploit are relatively rare, the cryptocurrency sector has seen significant losses in 2025.
A July report from Chainalysis noted that over 2.17 billion dollars has been stolen from cryptocurrency services so far this year, exceeding the total losses of 2024.
Most thefts remain linked to phishing attacks and scams, but hardware vulnerabilities such as the MT6878 flaw highlight an emerging risk vector for crypto users relying on smartphones.
Ledger disclosed the flaw to MediaTek in early May, after months of testing that began in February.
MediaTek subsequently informed affected vendors, but the flaw itself remains permanently embedded in the hardware.