Endpoint Security
,
Events
,
Governance & Risk Management
Security Researchers Reveal Methods to Reverse Engineer MediaTek Firmware
Reverse engineering-embedded firmware reveals how Wi-Fi chips operate beyond standard specifications. Security researchers Daniel Wegemer and Edoardo Mantovani spent two years analyzing MediaTek hardware to expose hidden modes that provide advanced access to wireless signals.
See Also: From VPN to Hyperscale: Island Reimagines the Browser
The project began with the pair’s curiosity about underexplored processors inside consumer devices. By studying drivers, parsing firmware and experimenting with test kits, Wegemer and Mantovani identified ways to enable monitor mode on MediaTek Wi-Fi chips. This mode, previously available only on notebooks, opens smartphone hardware for deeper security testing.
“We achieved to unlock some modes that allow you to basically have deeper access to the signals received by the Wi-Fi chip, and this can be used by other researchers to implement motion detection software,” Wegemer said.
In this video interview with Information Security Media Group at Nullcon Berlin 2025, Wegemer and Mantovani also discussed:
- Building firmware parsers to analyze MediaTek chip structures;
- Unlocking monitor mode to expand smartphone-based research capabilities;
- Identifying common methods for exploring embedded architectures such as ARM, MIPS and RISC-V.
Wegemer is focused on unlocking new features within closed-source firmware. His areas of expertise include Wi-Fi, IoT and automotive systems, with a keen interest in expanding hardware capabilities and advancing security research.
Mantovani specializes in firmware reverse engineering, kernel programming and software obfuscation.

