Pixel 9 BigWave Exploit: Sandbox Escape

Three bugs. Two hours. Pixel 9's BigWave driver hands attackers the keys to kernel town. Google's sandbox? Laughable.

Diagram of Pixel 9 BigWave driver UAF exploit chain from mediacodec sandbox to kernel compromise

Key Takeaways

  • Three bugs in Pixel 9's BigWave driver enable mediacodec sandbox escape to kernel R/W in hours of auditing.
  • UAF from ioctl timeout races lets attackers control hardware register writes via sprayed allocations.
  • Google delayed fixes over a year on one dupe bug; echoes past Android driver woes, predicting more to come.

Three bugs in two hours. That’s the security audit of Pixel 9’s BigWave driver—a hardware accelerator for AV1 decoding tucked into the mediacodec sandbox.

Google promised a fortress. Delivered a screen door.

And here’s the kicker: this chains from a 0-click Dolby exploit, straight to kernel read/write. On your shiny new Pixel 9. Fresh out of the box.

Look, I’ve seen sloppy drivers before. Qualcomm’s Snapdragon messes. MediaTek’s endless CVEs. But this? Pixel’s Tensor G4 SoC, hyped as premium silicon, coughs up gold for hackers.

The researcher—call ‘em the DriverCartographer—probed /dev/bigwave from the mediacodec context. SELinux sandboxed, right? Wrong. Accessible. Auditable. Breakable.

Why BigWave Even Exists (And Why It Sucks)

BigWave speeds AV1 decoding. Fine. Hardware offload makes sense—videos load faster, battery sips less. But Android drivers? They’re bug farms. Research screams it: local privilege escalations lurk here like roaches in a diner.

This one’s no different. Or worse. Fixes dropped January 5, 2026. Note the date. We’re talking future patches for today’s phones. Pixels shipped vulnerable. Users blissfully streaming Netflix, one ioctl away from doom.

First bug? Duplicate. Reported February 2024. Unfixed until June 2025 rediscovery. Over a year. Fix? Swap two lines. Google’s triage must be napping.

Second: Fancy double-free analog on a different list. Neat for nerds. Useless for us mortals.

Third? Chef’s kiss. The “nicest bug.” A use-after-free (UAF) that turns a timeout into total control.

The Nicest Bug: Timeout to Takeover

Open /dev/bigwave. Boom—new kernel struct inst, private_data on the fd. Inside: job substruct for register values, status. Submit work via BIGO_IOCX_PROCESS ioctl.

Driver grabs your userland registers, queues the job. Hands it to bigo_worker_thread. Then? wait_for_completion_timeout. 16 seconds.

Timeout hits? Dequeues job. But worker thread? Might just be dequeuing it too. Race city.

Userland bails—closes fd. inst and job freed. Worker? Marches on, dereferencing garbage.

static int bigo_worker_thread(void *data) { … inst = container_of(job, struct bigo_inst, job); //The job is an inline struct inside of the inst which gets UAF’d … bigo_run_job(core, job); … }

That’s your UAF highlight. Spray kmallocs—say, Unix sockets—and own job->regs. Control writes. memcpy_fromio dumps hardware registers wherever you point.

bigo_push_regs? Your registers rule the BigWave core. Pull ‘em back post-free? Kernel scribbles to attacker land.

Arbitrary read/write. Sandbox? Escaped. Mediacodec context to kernel root. From 0-click media decode.

Google spun this quiet. Patched late. No fanfare. Smells like embarrassment.

And my hot take—the one nobody’s saying? This echoes 2016’s Broadcom Wi-Fi flaws on Nexus. Closed-source blobs, rushed integration, eternal CVEs. Pixel’s not learning. Tensor chips stay black boxes; bugs fester. Prediction: 2027 brings round three, same playbook. Hardware hype, software holes.

Is Pixel 9’s Sandbox Actually Better?

No. SELinux domains constrain. But drivers pierce ‘em like paper. Mediacodec’s for “non-secure decoders.” BigWave sneaks in as hardware legit. Prudent? Ha.

AOSP docs brag isolation. Reality: ioctl races, UAFs, unpatched dupes. Sandboxing’s a myth when kernel threads juggle fd-bound objects sans sync.

Pixels tout Titan security chips, verified boot. Cute. But one driver flaw folds it all. Attacker replays this chain: Dolby RCE → mediacodec → BigWave UAF → kernel pwnd → full device ownage.

Users? Streaming suspect AV1? Doomed. Apps pushing media? Vectors galore.

Why Does This Matter for Pixel Owners?

You’re not safe ‘til patched. January 2026 fixes? Pixels get quarterly updates—maybe. Older models? Forgotten.

Dry humor time: Google’s Pixel line sells privacy, security. Meanwhile, their AV1 accelerator’s handing kernel keys to randos. Irony levels: Chernobyl.

Broader? Android’s driver mess scales. OEMs copy-paste. Expect echoes in Samsung, OnePlus. BigWave’s Pixel-specific, but the pattern? Universal.

Researchers rule—props to DriverCartographer. Tools like theirs map the minefield. Google? Fix faster. Open more source. Or keep bleeding exploits.

History bites: Recall Stagefright? Media bugs owned millions. This is Stagefright 2.0, kernel-flavored.

Stock up on paranoia. Update religiously. Ditch auto-play videos from sketch sources. And laugh bitterly at the next “secure” launch.


🧬 Related Insights

  • Read more:
  • Read more:

Frequently Asked Questions

What is the BigWave driver exploit on Pixel 9?

It’s a use-after-free in the /dev/bigwave kernel driver, triggered by ioctl races, leading to sandbox escape and arbitrary kernel read/write from mediacodec context.

Does the Pixel 9 BigWave vulnerability affect real users?

Yes—if chained with a media decoder RCE like Dolby. Streaming malicious AV1? You’re at risk for full compromise.

When did Google fix Pixel 9 BigWave bugs?

Patches landed January 5, 2026. Check your update status; not all Pixels roll out instantly.

Priya Sundaram
Written by

Hardware and infrastructure reporter. Tracks GPU wars, chip design, and the compute economy.

Frequently asked questions

What is the BigWave driver exploit on Pixel 9?
It's a use-after-free in the /dev/bigwave kernel driver, triggered by ioctl races, leading to sandbox escape and arbitrary kernel read/write from mediacodec context.
Does the Pixel 9 BigWave vulnerability affect real users?
Yes—if chained with a media decoder RCE like Dolby. Streaming malicious AV1? You're at risk for full compromise.
When did Google fix Pixel 9 BigWave bugs?
Patches landed January 5, 2026. Check your update status; not all Pixels roll out instantly.

Worth sharing?

Get the best AI stories of the week in your inbox — no noise, no spam.

Originally reported by Google Project Zero

Stay in the loop

The week's most important stories from theAIcatchup, delivered once a week.