A zero-click exploit chain has been developed for the Google Pixel 10, leveraging an updated version of the Dolby vulnerability, specifically CVE-2025-54957. This exploit chain enables attackers to gain root access on Android devices, demonstrating the continued vulnerability of these systems. The exploit was adapted from a previous chain developed for the Pixel 9, with modifications made to account for version-specific offsets. The active discussion between Google and security researchers regarding the exploitation status of CVE-2025-54957 underscores the potential urgency of this vulnerability, with implications for patching and monitoring strategies1. The ability to update and repurpose existing exploits highlights the ongoing challenges in securing Android devices. This development matters to security practitioners because it emphasizes the need for prompt patching and vigilant monitoring of known vulnerabilities, particularly those with active exploit chains.
A 0-click exploit chain for the Pixel 10: When a Door Closes, a Window Opens
⚡ High Priority
Why This Matters
CVE-2025-54957 is in active discussion involving Google — exploitation status determines whether this is patch-now or monitor.
References
- Google Project Zero. (2026, May 13). A 0-click exploit chain for the Pixel 10: When a Door Closes, a Window Opens. *Google Project Zero*. https://projectzero.google/2026/05/pixel-10-exploit.html
Original Source
Google Project Zero
Read original →