Looks like there's a bit more info on the zero-click Telegram RCE and holy shit this looks bad:
> This vulnerability allows an attacker to execute arbitrary code on a victim's device simply by sending a specially crafted animated sticker or media file. No user interaction is required
> A Telegram spokesperson denied the vulnerability's existence, claiming the research was incorrect.
@buherator it's possible, but it does link to the italian govt cybersecurity agency, which is something I didn't know from the initial ZDI candidate.
https://www.acn.gov.it/portale/w/telegram-rilevata-presunta-vulnerabilita-0-click
Looks like it poorly (possibly with AI) aggregates information from other places and I panicked / got fooled by my confirmation bias
Sorry
Eg. if you look at the Italian govt website
https://www.acn.gov.it/portale/w/telegram-rilevata-presunta-vulnerabilita-0-click
the "Telegram's response" part seems to say that Telegram claims to validate the stickers on its servers before sending them to any client apps
Which the article didn't mention.
But also I don't know Italian and used machine translation so I don't know for sure if that's what it says :/
@poni fuck, I got high on confirmation bias. It totally does look like slop.
Sorry for spreading it.