By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: New Qualcomm exploit chain brings bootloader unlocking freedom to Android flagships (Updated: Statement)
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > New Qualcomm exploit chain brings bootloader unlocking freedom to Android flagships (Updated: Statement)
News

New Qualcomm exploit chain brings bootloader unlocking freedom to Android flagships (Updated: Statement)

News Room
Last updated: 2026/03/14 at 7:40 AM
News Room Published 14 March 2026
Share
New Qualcomm exploit chain brings bootloader unlocking freedom to Android flagships (Updated: Statement)
SHARE

Robert Triggs / Android Authority

TL;DR

  • A vulnerability in Qualcomm’s Android Bootloader implementation allows unsigned code to run via the “efisp” partition on Android 16 devices.
  • This is paired with a “fastboot” command oversight to bypass SELinux and gain the permissions needed to unlock the bootloader.
  • This is further chained with vulnerability in Xiaomi’s Hyper OS to allow bootloader unlocking on the Xiaomi 17 series and more. Other Snapdragon 8 Elite Gen 5 phones could also be affected, though the chain of vulnerabilities could differ.

Update, March 14, 2026 (06:38 AM ET): A Qualcomm spokesperson shared with us the following statement:

Developing technologies that endeavor to support robust security and privacy is a priority for Qualcomm Technologies. We commend the researchers from the Xiaomi ShadowBlade Security Lab for using coordinated disclosure practices. Regarding their GBL-related research, fixes were made available to our customers in early March 2026. We encourage end users to apply security updates as they become available from device makers.

The statement attributes the research behind the GBL exploit to the Xiaomi ShadowBlade Security Lab, and notes that fixes for it were made available to Android brands earlier this month. Qualcomm’s statement also encourages users to install security updates as soon as they become available; however, note that this will close the loophole used for bootloader unlocking.


Original article, March 12, 2026 (12:56 PM ET): The Snapdragon 8 Elite Gen 5 is the newest flagship SoC from Qualcomm, and it’s undoubtedly one of the best chips that you can find on top Android flagships. We’re seeing widespread adoption of the SoC across phones like the Xiaomi 17 series, the OnePlus 15, and even the recently launched Galaxy S26 Ultra. This week, a new exploit came to light that appears to affect Qualcomm SoCs, primarily the latest Snapdragon 8 Elite Gen 5, allowing users to unlock the bootloader on phones that were previously notoriously difficult to unlock.

Don’t want to miss the best from Android Authority?

google preferred source badge light@2xgoogle preferred source badge dark@2x

What is the Qualcomm GBL Exploit?

A new exploit, dubbed “Qualcomm GBL Exploit,” has been floating around the internet over the past few days. While the identity of the discoverer is contentious, this exploit appears to target an oversight in how GBL (Generic Bootloader Library) is loaded on modern Android smartphones running on Qualcomm SoCs.

In a nutshell, Qualcomm’s vendor-specific Android Bootloader (ABL) is attempting to load the GBL from the “efisp” partition on phones shipping with Android 16. But in doing so, the Qualcomm ABL is merely checking for a UEFI app in that partition, rather than verifying its authenticity as the GBL. This opens the possibility of loading unsigned code onto the efisp partition, which is executed without a check. This forms the core of the Qualcomm GBL exploit.

GBL exploit gets chained with other vulnerabilities

However, writing to the efisp partition isn’t possible by default because SELinux is set to Enforcing, which blocks disallowed actions. To allow the efisp partition to be written to, SELinux needs to be set to Permissive mode, which can be done if you have root access. However, Permissive SELinux is itself required to unlock the bootloader via the GBL exploit and obtain root privileges, leaving you back at square one.

This is where another vulnerability comes into play.

Qualcomm’s ABL accepts a fastboot command called “fastboot oem set-gpu-preemption” that accepts “0” or “1” as the first parameter. However, this command also appears to unintentionally accept input arguments without any checks or sanitization, allowing you to arbitrarily add custom parameters to the command line. This, in turn, is used to append the “androidboot.selinux=permissive” parameter and switch SELinux from Enforcing to Permissive.

Code

fastboot set-gpu-preemption 0 androidboot.selinux=permissive

The above command surprisingly flips SELinux to Permissive.

Using the GBL exploit to bootloader unlock the Xiaomi 17 series

Xiaomi 17 Ultra HyperOS screen

Robert Triggs / Android Authority

After a reboot, the ABL loads the custom UEFI app without any checks, thanks to the GBL exploit. The custom UEFI app then proceeds to unlock the bootloader by setting both is_unlocked and is_unlocked_critical to “1,” which is exactly what the regular “fastboot oem unlock” command does as well.

Xiaomi 17 Ultra in hand

Robert Triggs / Android Authority

Xiaomi had introduced strict time-based, questionnaire-based, and device-limited criteria for bootloader unlock on its phones meant for the Chinese market. The process was so strict that most users eventually gave up on the idea of a bootloader unlock — until now, that is.

Reports indicate that Xiaomi will soon patch the app used in the exploit chain, and it may already have done so with the latest Hyper OS 3.0.304.0 builds released in China yesterday. Most instructions floating around the internet about this exploit chain advise users to disconnect their phones from the internet and not update their firmware.

Does the GBL exploit work on other phones?

It’s not immediately clear if the GBL exploit can work on other Qualcomm SoCs beyond the Snapdragon 8 Elite Gen 5. However, since GBL is being introduced with Android 16, that seems to be a requirement for now.

The GBL exploit should affect all OEMs (except Samsung, which uses its own S-Boot instead of Qualcomm’s ABL). However, the chain of vulnerabilities will differ to achieve a successful result.

From what I can see, Qualcomm has already fixed the checks on the fastboot oem set-gpu-preemption command. and even for other commands like fastboot oem set-hw-fence-value that weren’t part of the exploit chain but could be similarly exploited. However, it’s not clear whether the base GBL exploit has been fixed, and if so, whether the fix has been propagated to Android OEMs and then rolled out to consumers.

We’ve reached out to Qualcomm to learn more about the GBL exploit and whether it has been fixed yet. We’ll update this article when we hear back from the company or if we learn more technical details from other sources.


Thanks to developer Roger Ortiz for their help in piecing this together!

Thank you for being part of our community. Read our Comment Policy before posting.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Google Now Using AutoFDO To Enhance Android’s Linux Kernel Performance Google Now Using AutoFDO To Enhance Android’s Linux Kernel Performance
Next Article The Risk Engineering Behind a 1 Million SKU Automated Pricing Engine | HackerNoon The Risk Engineering Behind a 1 Million SKU Automated Pricing Engine | HackerNoon
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

EQT studies selling SUSE for up to  billion
EQT studies selling SUSE for up to $6 billion
Mobile
GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers
GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers
Computing
Qualcomm responds to GBL exploit used on latest Snapdragon flagships
Qualcomm responds to GBL exploit used on latest Snapdragon flagships
News
The Google Pixel 10 Pro Fold drops to a much lower price on Amazon
The Google Pixel 10 Pro Fold drops to a much lower price on Amazon
News

You Might also Like

Qualcomm responds to GBL exploit used on latest Snapdragon flagships
News

Qualcomm responds to GBL exploit used on latest Snapdragon flagships

3 Min Read
The Google Pixel 10 Pro Fold drops to a much lower price on Amazon
News

The Google Pixel 10 Pro Fold drops to a much lower price on Amazon

3 Min Read
UN: Putin’s deportation of Ukrainian children is a crime against humanity
News

UN: Putin’s deportation of Ukrainian children is a crime against humanity

6 Min Read
The Next Apple Watch Series 12 Could Finally Bring Back Classic iPhone Feature
News

The Next Apple Watch Series 12 Could Finally Bring Back Classic iPhone Feature

11 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?